100% found this document useful (5 votes)
2K views4 pages

Wireless Security Administration Checklist

This document provides a checklist of daily, weekly, monthly, quarterly, annual and initial tasks for a wireless administrator to secure a wireless network. The daily tasks include locating rogue wireless devices, reviewing logs for access points, intrusion detection systems and wireless devices. Weekly tasks involve updating devices, monitoring performance and backing up logs. Monthly tasks include a security review, checking device configurations and verifying client security. Quarterly tasks focus on password and key changes. Annual reviews cover policies and training. Initial and as-needed tasks include configuration management, user account oversight and responding to personnel or system changes.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
100% found this document useful (5 votes)
2K views4 pages

Wireless Security Administration Checklist

This document provides a checklist of daily, weekly, monthly, quarterly, annual and initial tasks for a wireless administrator to secure a wireless network. The daily tasks include locating rogue wireless devices, reviewing logs for access points, intrusion detection systems and wireless devices. Weekly tasks involve updating devices, monitoring performance and backing up logs. Monthly tasks include a security review, checking device configurations and verifying client security. Quarterly tasks focus on password and key changes. Annual reviews cover policies and training. Initial and as-needed tasks include configuration management, user account oversight and responding to personnel or system changes.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
  • Daily Tasks
  • Weekly Tasks
  • Monthly Tasks
  • Initial Tasks as Required
  • Quarterly Tasks
  • Annual Tasks

Wireless Administrator Checklist

http://networksecurity.weebly.com/

Daily Tasks

Physically locate rogue wireless devices within AOR


• Identify rogue devices with wireless discovery device
• Physically locate rogue devices
• Verify authorization for device or disable
• Document wireless device information for rogue devices located outside AOR
• Document and report wireless device information for rogue devices located within
AOR through approved reporting channels
• Track visit request to coordinate/prevent wireless enabled devices from
entering/leaving AOR

Review Wireless Access Point audit logs


• Identify and research system warning and error messages
• Identify and research failed access attempts
• Identify and research communication problems
• Track/monitor performance and activity

Review Wireless IDS audit logs


• Research generated alerts
• Identify and research system warning and error messages
• Identify and research failed access attempts
• Identify and research communication problems
• Track/monitor performance and activity

Review Wireless I/A device (i.e. RADIUS) audit logs


• Identify and research failed logon attempts
• Identify and research system warning and error messages
• Track/monitor performance and activity

Virus scan devices that are part of the wireless infrastructure


• Use approved virus scanner to scan wireless devices (where appropriate)

Weekly Tasks

Wireless device configuration management


• Check vendor sites for patch and firmware updates
• Update Wireless IDS signature files
• Update Anti-Virus signature files
• Monitor security news sources for wireless security related information
• Compare wireless network device configuration files against a baseline for
changes
• Check for Unnecessary Services

Archive Audit logs


• Archive audit logs to a media/device with one-year retention

Monitor wireless device performance


• Verify wireless encryption/authentication devices (RADIUS, IPSEC service, etc)
for proper performance and activity
• Run hardware integrity diagnostics on wireless network devices
• Synchronize clock/time on wireless devices

Perform/verify weekly backup


• Run and verify that a successful backup of wireless network devices has been
completed

Monthly Tasks

Perform Self-Assessment Security and Policy Review


• Use Wireless Checklist to perform Self-Assessment Security Review
• Use Network Checklist to perform Self-Assessment Security Review
• Ensure wireless infrastructure complies with site Wireless Policy
• Develop plan to implement remediation actions to mitigate deviations
• Implement corrective actions to mitigate deviations
• Run an approved Vulnerability scanner (SCCVI)

Wireless device configuration management


• Compare device configuration with documented secure baseline
• Verify physical location of wireless devices
• Verify physical integrity of wireless devices (have devices been modified or
opened)
• Verify equipment has not been replaced or moved
• Verify antenna location, position, and direction

Verify wireless client security configuration


• Spot check the configuration on a sample of wireless client devices (25% of
wireless devices)
• Identify wireless profiles that indicate wireless client is accessing unauthorized
wireless networks

Quarterly Tasks

Wireless device configuration management


• Change administrator/management passwords on wireless network devices
• Change Pre-Shared Key (PSK) on all appropriate devices

Test backup/restore procedures


• Restore backup files to a test system to verify procedures and files are usable

Wireless signal strength mapping


• Use mobile device to identify/document signal coverage of wireless network
devices
• Use mobile device to identify/document residential/commercial wireless devices
that are visible during site surveys

Annual Tasks

Review and update site policies and training


• Ensure site Acceptable Use Policy addresses current Wireless Security Policy
• Ensure personnel Annual Security Awareness Training addresses current site
Wireless Security Policy
• Ensure site Certification and Accreditation documents reflect the current wireless
infrastructure
• Ensure wireless users are informed about increased level of threat associated with
wireless usage
• Ensure wireless users receive additional training related to wireless attack
detection and prevention

Initial

Tasks as Required

Wireless device configuration management


• Delete clients from the MAC address filtering list and access control list that no
longer require wireless network access
• Install vendor security patches
• Update VMS for IAVMs
• Update wireless device firmware
• Schedule downtime for system/device reboots
• Change all default passwords on new equipment

Wireless user account management


• Maintain list of authorized wireless users
• Verify list of authorized wireless users still require wireless access
• Verify User Account Configuration
• Remove access from users that are no longer authorized for wireless access
• Ensure new wireless users have signed a site Wireless Usage Agreement

Authorized wireless device tracking


• Maintain list of authorized wireless devices
• Remove devices that are no longer approved for wireless access

After administrator personnel departure


• Change encryption keys on all wireless network devices
• Change administrator passwords
• Change passwords on wireless network devices
• Remove departing administrator’s wireless access

INFOCON Status requirement changes


• Adjust wireless security review/configuration to reflect current INFOCON
requirements

After system configuration changes


• Verify changes accomplish the desired objectives
• Create Emergency System Recovery Data
• Create new system configuration baseline
• Document System Configuration Changes
• Review and update SSAA
• Update VMS for Asset Changes
• Run and verify that a successful backup of the device has been performed
• Note the locations of wireless routers, APs, repeaters, dependent security devices,
and antenna on installation maps and floor plans
• Use mobile device to identify/document signal coverage of wireless network
devices (same process as Monthly Task)

After security incident involving wireless infrastructure


• Perform all tasks identified in this checklist

----------------------------------------------------------------

Wireless Administrator Checklist
http://networksecurity.weebly.com/ (http://networksecurity.weebly.com/)
Daily Tasks
Physical
•
Update Anti-Virus signature files
•
Monitor security news sources for wireless security related information
•
Compare wirel
•
Spot check the configuration on a sample of wireless client devices (25% of 
wireless devices)
•
Identify wireless profiles
•
Update VMS for IAVMs
•
Update wireless device firmware
•
Schedule downtime for system/device reboots
•
Change all default p

You might also like