Protection of wireless connections

Critical
High
Normal
Low

The use of the wireless network is secured with sufficient keys and the connection traffic to the network router is encrypted. The wireless network for guest use is isolated from the company's own internal network.

Connected other frameworks and requirements:
13.1.2: Security of network services
ISO 27001
I05: Langattomat verkot
PR.PT-4: Communications and control networks
NIST CSF
8.21: Security of network services
ISO 27001
No items found.