Management countermeasures set the stage for all that happens on the WLAN. Based on policy, these countermeasures should work to:
Identify who may use WLAN technology in a corporation and limit access by function, location, and workgroup or security clearance.
Identify whether Internet access is required beyond the WLAN network. Some WLAN applications are for intranets only.
Describe who can install access points and other wireless equipment. With the ease of installation and configurations, it is important to verify proper use of the technology.
Provide limitations on the location of and physical security for access points to minimize the propagation (distance and availability) of the signal.
Describe the type of information that may be sent over wireless links to reduce compromises of sensitive data.
Describe conditions under which wireless devices are allowed.
Define standard security settings for access points to reduce risks and establish uniform configurations standards.
Describe limitations on how the wireless device may be used, such as location in and outside the building and near sensitive areas, to gain access to personal or sensitive data.
Describe the hardware and software configuration of all wireless devices.
Provide guidelines on reporting losses of wireless devices and security incidents
Provide guidelines for the protection of wireless clients to minimize/ reduce theft.
Provide guidelines on the use of encryption and key management systems.
Define the frequency and scope of security assessments to include access point discovery.