Last modified: 14 марта, 2025
Policy No. 4204 Wireless Device Communication Procedure
Обзор
With the mass explosion of smartphones and tablets, pervasive wireless connectivity is almost a given at any organization. Unsecured wireless configurations can provide an easy open door for malicious threat actors.
Назначение
The purpose of this procedure is to secure and protect assets owned by PCSD. PCSD provides computer devices, networks, and other electronic information systems to meet missions, goals, and initiatives. PCSD grants access to these resources as a privilege and must manage them responsibly to maintain the confidentiality, integrity, and availability of all assets.
This procedure specifies the conditions that wireless infrastructure devices must satisfy to connect to the PCSD network. Only those wireless devices that meet the standards specified in this procedure or are granted an exception by the InfoSec team are approved for connectivity to a PCSD network.
Область применения
All employees, contractors, consultants, temporary and other workers at PCSD, including all personnel affiliated with third parties that maintain a wireless device on behalf of PCSD, must adhere to this procedure. This procedure applies to all wireless devices that connect to a PCSD network or reside at a PCSD location.
The following list includes, but is not limited to, endpoint devices such as laptops, desktops, cellular phones, and tablets. This includes any form of wireless communication device capable of transmitting packet data.
Процедура
General Requirements
- All wireless devices that reside at a PCSD location and connect to a PCSD network, or provide access to information classified as Confidential or above, must abide by the standards specified in the Wireless Infrastructure Communication Procedure.
- Use PCSD-approved authentication protocols and infrastructure.
- Use PCSD-approved encryption protocols.
- Maintain a hardware address (MAC address) that can be registered and tracked.
Last Update Status:
Updated January 2015
Related Policies and Procedures
- 4204 Допустимое использование
- 4204 Аудит
- 4204 Чистый стол
- 4204 План аварийного восстановления
- 4204 Электронная почта
- 4204 Обучение сотрудников мерам безопасности
- 4204 Шифрование
- 4204 Пароль
- 4204 Удаленный доступ
- 4204 Безопасность маршрутизаторов и коммутаторов
- 4204 Безопасность чувствительных рабочих станций
- 4204 План действий по обеспечению безопасности
- 4204 Безопасность сервера
- 4204 Установка программного обеспечения
- 4204 Безопасность веб-сервисов
- 4204 Связь с беспроводными устройствами
- 4204 Беспроводная инфраструктура связи