15.7: Leverage the Advanced Encryption Standard (AES) to Encrypt Wireless Data

Leverage the Advanced Encryption Standard (AES) to encrypt wireless data in transit.

Asset Type

Security Function

Implementation Groups

Network

Protect

1, 2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

Inputs

  1. List of wireless devices (derived from Endpoint Inventory; sub-control 1.4)

  2. List of AES-capable wireless devices (sub-control 1.5)

Operations

  1. For each AES-capable wireless device, collect cipher suite configuration

Measures

  • M1 = List of wireless devices

  • M2 = Count of wireless devices

  • M3 = List of AES-capable wireless devices

  • M4 = Count of AES-capable wireless devices

  • M5 = List of non-AES-capable wireless devices

  • M6 = Count of non-AES-capable wireless devices

  • M7 = List of appropriately configured AES-capable wireless devices

  • M8 = Count of appropriately configured AES-capable wireless devices

  • M9 = List of inappropriately configured AES-capable wireless devices

  • M10 = Count of inappropriately configured AES-capable wireless devices

Metrics

Coverage

Metric

What percentage of AES-capable devices are configured to use cipher suites leveraging AES?

Calculation

M8 / M4