15.8: Use Wireless Authentication Protocols That Require Mutual, Multi-Factor Authentication

Ensure that wireless networks use authentication protocols such as Extensible Authentication Protocol-Transport Layer Security (EAP/TLS), that requires mutual, multi-factor authentication.

Asset Type

Security Function

Implementation Groups

Network

Protect

3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

Inputs

  1. The list of endpoints

  2. The list of authorized authentication protocols

Operations

  1. Enumerate all wireless access points

  2. For each identified wireless access point, examine its configuration for the following noting appropriately and inappropriately configured endpoints along the way:
    1. Configured authentication protocol (compare to list of authorized authentication protocols)

  3. Enumerate all appropriately configured endpoints

  4. Enumerate all inappropriately configured endpoints

Measures

  • M1 = List of all wireless access points

  • M2 = List of appropriately configured wireless access points

  • M3 = List of inappropriately configured wireless access points

  • M4 = Count of wireless access points (count of M1)

  • M5 = Count of appropriately configured wireless access points (count of M2)

  • M6 = Count of inappropriately configured wireless access points (count of M3)

Metrics

Coverage

Metric

The ratio of appropriately configured wireless access points to the total number of
wireless access points

Calculation

M5 / M4