DE.CM-01.273
Does your organization have a process to regularly monitor facilities for unauthorized or rogue wireless networks?
Explanation
Unauthorized wireless networks can create security vulnerabilities by providing attackers with potential entry points that bypass established network security controls. Regular monitoring helps detect rogue access points, unauthorized hotspots, or malicious wireless devices that may have been installed by external threat actors or non-compliant employees. Evidence could include wireless scanning reports, network monitoring logs, documentation of a wireless intrusion detection system (WIDS), or a written procedure for periodic wireless network sweeps with timestamps of when they were performed.
Implementation Example
Monitor facilities for unauthorized or rogue wireless networks
ID: DE.CM-01.273
Context
- Function
- DE: DETECT
- Category
- DE.CM: Continuous Monitoring
- Sub-Category
- Networks and network services are monitored to find potentially adverse events

