Use secure network management and communication protocols (e.g., 802.1X, Wi-Fi Protected Access
2 (WPA2) Enterprise or greater).
The organization protects wireless connections by securing the network with strong encryption keys and using protocols like WPA2 Enterprise to ensure encrypted traffic to network routers.
For secure access control, technical identification of end devices using 802.1X is required before network access, preventing unauthorized connections unless physically restricted.
Standard templates for secure configurations are defined, maintaining security features such as access controls throughout the device and network lifecycle, thereby supporting the implementation of secure protocols like 802.1X and WPA2 Enterprise.
An owner is defined for an organization's networks. The owner is responsible for planning the structure of the network and documenting it.
Separate network areas are used in network design as needed. Domain areas can be defined by e.g.:
Separation can be implemented either with physically separate networks or with logically separate networks.
The use of the wireless network is secured with sufficient keys and the connection traffic to the network router is encrypted. The wireless network for guest use is isolated from the company's own internal network.