Wireless Access Points Security
|
|
Objective
In accordance with the Information Security and Acceptable Use Policy, all systems
owned or managed by Oakland Community College must be adequately protected to ensure
confidentiality, integrity, availability, and accountability of such systems. Wireless
access points are used to extend College network segments and provide access to networked
hosts via wireless connection methods. As a result, wireless access point might be
accessible from beyond physically secured College buildings and properties.
Physical Location
Wireless access points should be installed in inconspicuous locations and be appropriately
secured to limit the possibility of theft or tampering. Installation in a physically
secured office suite provides adequate security; access points located in public-use
areas may benefit from additional security measures such as locks.
Support Requirements
All access points will be provided and centrally maintained by the OCC IT. All wireless
access points must have a valid support contract.
Patching
Wireless access points device firmware must be at least n-1, all Security patches
must be installed within 14 days, in a timely manner, depending on the likelihood
and impact of vulnerability exploitation.
Server Registration
All wireless networks and access points must be recorded with the Information Security
Office.
The College wired network may not be extended using unauthorized and/or consumer-grade hardware without the review and authorization of IT.
Logging
Activity must be logged and retained for a minimum of 90 days to facilitate troubleshooting
and investigations. The following types of activities must be logged:
Logs should also be sent to a centralized logging server to reduce storage requirements
on local systems
and reduce feasibility of log tampering.
Incident Management
System owners are required to report any suspicious activity to the IT for investigation.
Backup / Recovery
Backup and recovery procedures must be established to ensure that wireless networks
can be rebuilt in the event of a disruptive event. Further, configuration backups
should be captured before significant configuration changes to ensure a method of
failing back after an unexpected disruption. Backup media should be encrypted if transported
or stored outside of an OCC facility.
Exemptions
In the event that compliance with this standard cannot be met, please contact ITSecurity@oaklandcc.edu
to submit an exemption request that will be approved or denied by IT. Denied exemption
requests may be appealed to the CIO for final decision
Change Log