Wireless Security Assessment (WSA)
Ensures protection against unauthorized access to wireless networks and data, verifies segregation of guest access from private networks and systems, and identifies potential backdoors via rogue access points. It assesses corporate, guest, and point-to-point wireless LAN deployments to identify weaknesses in architecture, configuration, authentication, and encryption, including detection of rogue access points. Validates that authentication and encryption effectively prevent unauthorized access and traffic snooping.
Highlights
- Enumeration of all active SSIDs
- Evaluation of authentication and encryption strength for authorized wireless networks
- Assessment of isolation of guest wireless networks
- Identification of vulnerabilities within wireless infrastructure
- Review of guest/user wireless account provisioning protocols
- Identification of rogue access points
- Evaluation of access achievable through rogue wireless networks
- Remediation recommendations
Targets
- Authorized employee wireless networks
- Guest wireless networks and supporting infrastructure
- Special-purpose wireless networks
- Point-to-point wireless networks
- Authentication and encryption protocol implementation vulnerabilities
- Network segregation issues
- Rogue access points/networks
user/guest wireless assessment
encryption strength
authentication strength
rogue access points
wireless segregation
wireless infrastructure vulnerabilities
private wireless
guest wireless
authentication
encryption
segregation
configuration
rogue wireless
best-practices
PCI-DSS (Section 11.1)