R253. Restrict network access


The access to private wireless networks must be restricted through user credentials and authorized MAC addresses.


  1. CIS Controls. 1.7 Deploy Port Level Access Control. Utilize port level access control, following 802.1x standards, to control which devices can authenticate to the network.

  2. ISO 27001:2013. Annex A - 9.1.2 Users should only have access to the internal network and network services for which they have been explicitly authorized.

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.