Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Protection of wireless connections

Critical
High
Normal
Low

The use of the wireless network is secured with sufficient keys and the connection traffic to the network router is encrypted. The wireless network for guest use is isolated from the company's own internal network.

Connected other frameworks and requirements:
I05: Langattomat verkot
13.1.2: Security of network services
ISO 27001
PR.PT-4: Communications and control networks
NIST CSF
8.21: Security of network services
ISO 27001
No items found.