Checklist for Auditing Wireless LANs
qEnsure that access points are running the latest approved software.
qEvaluate the use and controls around centralized WLAN management.
qVerify that your mobile clients are running protective software.
qEvaluate the security of the chosen authentication method.
qEvaluate the security of the chosen communications method.
qEvaluate the use of security monitoring software and processes.
qVerify that rogue access points are not used on the network.
qEvaluate procedures in place for tracking end-user trouble tickets.
qEnsure that appropriate security policies are in place for your WLAN.
qEvaluate disaster-recovery processes in place to restore wireless access should a disaster happen.
qEvaluate whether effective change-management processes exist.
Checklist for Auditing Mobile Devices
qEnsure that mobile device gateways are running the latest approved software and patches.
qVerify that mobile clients have protective features enabled if they are required by your mobile device security policy.
qDetermine the effectiveness of device security controls around protecting data when a hacker has physical access to a device.
qEvaluate the use of security monitoring software and processes.
qVerify that unmanaged devices are not used on the network. Evaluate controls over unmanaged devices.
qEvaluate procedures in place for tracking end-user trouble tickets.
qEnsure that appropriate security policies are in place for your mobile devices.
qEvaluate disaster recovery processes in place to restore mobile device access should a disaster happen.
qEvaluate whether effective change management processes exist.
qEvaluate controls in place to manage the service life cycle of personally owned and company-owned devices and any associated accounts used for the gateway.