Use of Secure Network Management and Communication Protocols
Description
Use secure network management and communication protocols (e.g., 802.1X, Wi-Fi Protected Access 2 (WPA2) Enterprise or greater).
Implementation Checklist
Tool Recommendations
Network access control platform providing device profiling, posture assessment, guest access, and BYOD policy enforcement
Cisco · Per-endpoint subscription
Next-generation firewall platform with application-aware policies, threat prevention, URL filtering, and SD-WAN
Palo Alto Networks · Appliance + subscription
Enterprise firewall and security fabric with NGFW, SD-WAN, IPS, and integrated security services
Fortinet · Appliance + subscription
Threats & Vulnerabilities (CIS RAM)
Threat Scenarios
Wireless Network Eavesdropping via Weak Protocols
ConfidentialityAttackers intercept wireless traffic using deprecated protocols (WEP, WPA1, or open networks) to capture credentials, session tokens, and sensitive data transmitted over the air, requiring only commodity hardware and freely available tools.
Rogue Device Connection via Unauthenticated Network Access
IntegrityWithout 802.1X or equivalent port-based authentication, any device can connect to the network by plugging into an Ethernet port, allowing attackers to place rogue devices, packet sniffers, or attack platforms on the internal network.
Man-in-the-Middle Attack on Insecure Network Protocols
ConfidentialityInsecure network management and communication protocols allow attackers positioned on the network to intercept, modify, or inject traffic between network devices and management stations, compromising device configurations and data integrity.
Vulnerabilities (When Safeguard Absent)
Weak Wireless Security Protocols Deployed
Wireless networks use deprecated security protocols (WEP, WPA-Personal) instead of WPA2/WPA3 Enterprise, providing weak encryption and authentication that can be cracked with readily available tools.
No 802.1X Port-Based Network Access Control
Wired and wireless network access lacks 802.1X authentication, allowing any device to connect to the network without verifying its identity or authorization, bypassing network security policies entirely.
Evidence Requirements
| Type | Evidence Item | Collection Frequency |
|---|---|---|
| Technical | Configuration screenshots or exports showing protection controls enabled | Captured quarterly |
| Document | Procedure documentation for protection measures | Reviewed annually |
| Document | Governing policy document (current, approved, communicated) | Reviewed annually |