💼 11.1 Implement processes to test for the presence of wireless access points (802.11), and detect and identify all authorized and unauthorized wireless access points on a quarterly basis.
- ID:
/frameworks/pci-dss-v3.2.1/11/01
Description
Methods that may be used in the process include but are not limited to wireless network scans, physical/logical inspections of system components and infrastructure, network access control (NAC), or wireless IDS/IPS.
Whichever methods are used, they must be sufficient to detect and identify both authorized and unauthorized devices.
Similar
- Sections
/frameworks/pci-dss-v4.0/11/02/01
- Internal
- ID:
dec-c-9cecc7d9
- ID:
Similar Sections (Take Policies From)
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 PCI DSS v4.0 → 💼 11.2.1 Authorized and unauthorized wireless access points are managed. | 1 | no data |
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 PCI DSS v4.0 → 💼 11.2.1 Authorized and unauthorized wireless access points are managed. | 1 | no data |
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 11.1.1 Maintain an inventory of authorized wireless access points including a documented business justification. | 1 | no data | |||
💼 11.1.2 Implement incident response procedures in the event unauthorized wireless access points are detected. | 1 | no data |
Policies (1)
Policy | Logic Count | Flags | Compliance |
---|---|---|---|
🛡️ Google Cloud Asset Inventory API is not enabled🟢 | 1 | 🟢 x6 | no data |