Difference between revisions of "Mitigation/M0806"

From attackics
Jump to navigation Jump to search
 
Line 4: Line 4:
 
|IEC 62443 4-2 Control=CR 1.6
 
|IEC 62443 4-2 Control=CR 1.6
 
|NIST Control=SC-40
 
|NIST Control=SC-40
|Technical Description=Wireless signals frequently propagate outside of organizational boundaries, which provide opportunities for adversaries to monitor or gain unauthorized access to the wireless networks.[[CiteRef::mitigation - DHS wireless - 201003]] To minimize this threat, organizations should implement measures to detect, understand, and reduce unnecessary RF propagation.[[CiteRef::mitigation - DHS wireless Detection - 201904]]
+
|Technical Description=Wireless signals frequently propagate outside of organizational boundaries, which provide opportunities for adversaries to monitor or gain unauthorized access to the wireless network.[[CiteRef::mitigation - DHS wireless - 201003]] To minimize this threat, organizations should implement measures to detect, understand, and reduce unnecessary RF propagation.[[CiteRef::mitigation - DHS wireless Detection - 201904]]
 
|Date=2020/09/17
 
|Date=2020/09/17
 
|IEC 62443 Control=3-3 FR 1 - Identification and authentication controls; 3-3 SR 1.6 - Wireless access management
 
|IEC 62443 Control=3-3 FR 1 - Identification and authentication controls; 3-3 SR 1.6 - Wireless access management
 
}}
 
}}

Latest revision as of 08:23, 28 September 2020

Minimize Wireless Signal Propagation
Mitigation
ID M0806
NIST SP 800-53 Rev. 4 SC-40
IEC 62443-3-3:2013 SR 1.6
IEC 62443-4-2:2019 CR 1.6

Description

Wireless signals frequently propagate outside of organizational boundaries, which provide opportunities for adversaries to monitor or gain unauthorized access to the wireless network.1 To minimize this threat, organizations should implement measures to detect, understand, and reduce unnecessary RF propagation.2


Techniques Addressed by Mitigation

NameUse
Wireless CompromiseTechniques can include (i) reducing transmission power on wireless signals, (ii) adjusting antenna gain to prevent extensions beyond organizational boundaries, and (iii) employing RF shielding techniques to block excessive signal propagation.2
Wireless SniffingReduce the range of RF communications to their intended operating range when possible. Propagation reduction methods may include (i) reducing transmission power on wireless signals, (ii) adjusting antenna gain to prevent extensions beyond organizational boundaries, and (iii) employing RF shielding techniques to block excessive signal propagation. 2