Skip to main content

💼 11.1 Implement processes to test for the presence of wireless access points (802.11), and detect and identify all authorized and unauthorized wireless access points on a quarterly basis.

  • ID: /frameworks/pci-dss-v3.2.1/11/01

Description

Methods that may be used in the process include but are not limited to wireless network scans, physical/logical inspections of system components and infrastructure, network access control (NAC), or wireless IDS/IPS.

Whichever methods are used, they must be sufficient to detect and identify both authorized and unauthorized devices.

Similar

  • Sections
    • /frameworks/pci-dss-v4.0/11/02/01
  • Internal
    • ID: dec-c-9cecc7d9

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 PCI DSS v4.0 → 💼 11.2.1 Authorized and unauthorized wireless access points are managed.1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 PCI DSS v4.0 → 💼 11.2.1 Authorized and unauthorized wireless access points are managed.1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 11.1.1 Maintain an inventory of authorized wireless access points including a documented business justification.1no data
💼 11.1.2 Implement incident response procedures in the event unauthorized wireless access points are detected.1no data

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ Google Cloud Asset Inventory API is not enabled🟢1🟢 x6no data