Wireless Security Audit Checklist

Conduct a Security Audit on a Personal WLAN Infrastructure
As the junior member of the Just Ducky network security team, you want to make sure you apply your wireless security knowledge to protect your home wireless network.
• Create your own version of a comprehensive Wireless Security Audit Checklist.
• Select a Personal WLAN infrastructure and obtain written permission to conduct a Security Audit.
• Write your conclusions providing a description of the security posture of the selected WLAN and include recommendations.

Wireless Security Audit Checklist Introduction Performing a comprehensive security audit on a personal WLAN infrastructure is crucial to ensure the protection of sensitive data and prevent unauthorized access. This checklist provides a systematic approach to assess the security posture of a selected WLAN. The audit should be conducted with written permission from the owner of the WLAN. Checklist Network Configuration Change default SSID and disable broadcasting Enable network encryption (WPA2 or higher) with a strong passphrase Disable WPS (Wi-Fi Protected Setup) if not needed Disable remote management and administration access Set up a guest network for visitors, separate from the main network Access Control Change default admin credentials for the router Use a strong and unique password for the admin account Disable unnecessary services and ports Enable MAC address filtering for authorized devices Regularly review and update the list of authorized devices Wi-Fi Protected Setup (WPS) Disable WPS if not required If WPS is enabled, ensure it uses a long and strong PIN code Encryption and Authentication Use WPA2 or higher encryption protocol for Wi-Fi security Implement AES encryption instead of TKIP Use a strong and unique Wi-Fi passphrase Consider implementing 802.1X authentication for enterprise-grade security Firmware and Software Updates Ensure the router firmware is up to date Regularly check for firmware updates from the manufacturer’s website Update devices connected to the WLAN to the latest software versions Firewall and Intrusion Prevention Enable the built-in firewall on the router Configure firewall rules to only allow necessary incoming and outgoing traffic Consider using an additional software-based firewall on connected devices Physical Security Place the router in a secure location, away from public view Restrict physical access to the router by unauthorized individuals Consider using tamper-evident seals or locks to protect the router Logging and Monitoring Enable logging on the router to track potential security events Regularly review router logs for any suspicious activity or unauthorized connections Conclusions and Recommendations Based on the security audit conducted on the selected WLAN infrastructure, the following conclusions and recommendations can be made: Network Configuration: The network is properly configured with a changed SSID, disabled broadcasting, and enabled WPA2 encryption. These measures provide a basic level of security. Recommendation: Regularly change the Wi-Fi passphrase to enhance security. Access Control: Default admin credentials have been changed, and unnecessary services are disabled. However, MAC address filtering is not implemented. Recommendation: Enable MAC address filtering to restrict access to authorized devices. Wi-Fi Protected Setup (WPS): WPS is disabled, which is a good practice. Recommendation: None. Encryption and Authentication: WPA2 encryption with AES is implemented, ensuring strong security. However, 802.1X authentication is not in use. Recommendation: Consider implementing 802.1X authentication for enhanced security in an enterprise environment. Firmware and Software Updates: The router firmware should be regularly updated to patch any vulnerabilities. It is essential to update connected devices as well. Recommendation: Routinely check for firmware updates from the manufacturer’s website and update devices to the latest software versions. Firewall and Intrusion Prevention: The built-in firewall on the router is enabled, but specific rules should be configured to allow only necessary traffic. Recommendation: Review and configure firewall rules to restrict unnecessary incoming and outgoing traffic. Physical Security: The router is placed in a secure location, but additional measures such as tamper-evident seals or locks could provide extra protection. Recommendation: Consider implementing physical security measures to prevent unauthorized access to the router. Logging and Monitoring: Logging is enabled on the router, allowing potential security events to be tracked. Regular review of logs is necessary to detect any suspicious activity. Recommendation: Establish a regular log review process to identify and respond to any security incidents. Overall, the selected WLAN infrastructure demonstrates basic security measures, but there are areas for improvement. By implementing the recommended measures, the security posture of the WLAN can be significantly enhanced, reducing the risk of unauthorized access and ensuring the protection of sensitive data.  

Sample Answer