The access to private wireless networks must be restricted
through user credentials and authorized
CIS Controls. 1.7 Deploy Port Level Access Control. Utilize port level access control, following 802.1x standards, to control which devices can authenticate to the network.
ISO 27001:2013. Annex A - 9.1.2 Users should only have access to the internal network and network services for which they have been explicitly authorized.
Start with Fluid Attacks
We are a proud corporate member of the OWASP Foundation