Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for compliance with minimum security requirements for wireless access configuration/connection requirements as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for wireless access implementation guidance as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization ensures that the ad hoc mode of its wireless access points have been disabled.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization clears the configuration of its wireless access points before disposing of them.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization ensures that encryption keys used for its wireless access points are at least 128-bits in length.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization virtually or physically insulate its wireless network from its operational wired infrastructure.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization maintains a complete inventory of all wireless access points and 802.11 wireless devices.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization enables logging on its wireless access points (if supported).
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization enables user authentication for the management interface of wireless access points.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization enables encryption mechanisms for the management interface of wireless access points.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization ensures that all non-essential management protocols on its wireless access points are disabled.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization ensures that all non-essential management protocols on its wireless access points are disabled.
|
1.1 |
Defines conformance and assessment criteria for verifying that an organization ensures that all non-essential management protocols on its wireless access points are disabled.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization place wireless access points in secured areas.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization reviews the logs of its wireless access points on a recurring basis per local policy.
|
1.0 |
Defines conformance and assessment criteria for verifying that an.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization ensures that use of the reset function on wireless access points maintains their security.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization enables all security features of its wireless access points including cryptographic authentication, firewall, and other privacy features.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization validates that the service set identifier (SSID) character strings used on its wireless access points do not contain any information that identifies the organization or the services accessible.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization disables the broadcast SSID feature of its wireless access points.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization changes the default service set identifier (SSID) for its wireless access points.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for wireless access usage restrictions as related to overall access control requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization reduces the probability that usable wireless signals can be received outside of organization-controlled boundaries.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system protects wireless access to the system.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization disables wireless networking capabilities internally embedded within information system components prior to issuance and deployment when they are not intended for use, .
|
1.0 |