Australian Government
Information Security Manual
JANUARY 2019
Guidelines for network management
Network design and configuration
Network documentation
It is important that network documentation accurately depicts the current state of a network. This typically includes
network devices such as firewalls, data diodes, intrusion detection and prevention systems, routers, switches, and
critical servers and services. Furthermore, as this documentation could be used by an adversary to assist in
compromising a network, it is important that it is appropriately protected.
Security Control: 0516; Revision: 4; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
Network documentation includes a high-level network diagram showing all connections into the network; a logical
network diagram showing all network devices, critical servers and services; and the configuration of all network devices.
Security Control: 0518; Revision: 4; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
Network documentation is updated as network configuration changes are made and includes a ‘current as at [date]’ or
equivalent statement.
Security Control: 1178; Revision: 3; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
Network documentation provided to a third party, or published in public tender documentation, only contains details
necessary for other parties to undertake contractual services.
Network segmentation and segregation
Network segmentation and segregation is one of the most effective security controls to prevent an adversary from
propagating through a network and accessing target information after they have gained initial access. Technologies to
enforce network segmentation and segregation also contain logging functionality that can be valuable in detecting an
intrusion and, in the event of a compromise, isolating compromised devices from the rest of a network.
Network segmentation and segregation involves separating a network into multiple functional network zones with a
view to protecting important information and critical services. For example, one network zone may contain user
workstations while another network zone contains authentication servers. Proper network segmentation and
segregation also assists in the creation and maintenance of proper network access control lists.
Security Control: 1181; Revision: 3; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Networks are divided into multiple functional network zones according to the sensitivity or criticality of information or
services.
1
Using Virtual Local Area Networks
Virtual Local Area Networks (VLANs) can be used to implement network segmentation and segregation as long as the
networks are all official networks or all the same classification. In such cases, if a data spill occurs between the
networks the impact will be lesser than if a data spill occurred between two networks of different classifications or
between an official or classified network and public network infrastructure.
For the purposes of this section, Multiprotocol Label Switching (MPLS) is considered to be equivalent to VLANs and is
subject to the same controls.
Security Control: 1310; Revision: 3; Updated: Sep-18; Applicability: O; Priority: Should
VLANs are not used to separate network traffic between official networks and public network infrastructure.
Security Control: 1532; Revision: 0; Updated: Sep-18; Applicability: P, S, TS; Priority: Must
VLANs are not used to separate network traffic between classified networks and public network infrastructure.
Security Control: 0529; Revision: 5; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
VLANs are not used to separate network traffic between official and classified networks, or networks of different
classifications.
Security Control: 1364; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
VLANs belonging to different security domains are terminated on separate physical network interfaces.
Security Control: 0535; Revision: 5; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
VLANs belonging to official and classified networks, or networks of different classifications, do not share VLAN trunks.
Security Control: 0530; Revision: 5; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
Network devices implementing VLANs are managed from the most trusted network.
Using Internet Protocol version 6
Internet Protocol version 6 (IPv6) functionality can introduce additional security risks to a network. As such, disabling
IPv6 functionality until it is intended to be used will minimise the attack surface of the network and ensure that any
IPv6 functionality that is not intended to be used cannot be exploited.
To aid in the transition from Internet Protocol version 4 (IPv4) to IPv6, numerous tunnelling protocols have been
developed that are designed to allow interoperability between the protocols. Disabling IPv6 tunnelling protocols on
network devices and ICT equipment that do not explicitly require such functionality will prevent an adversary bypassing
traditional network defences by encapsulating IPv6 data inside IPv4 packets.
Stateless Address Autoconfiguration (SLAAC) is a method of stateless Internet Protocol (IP) address configuration in
IPv6 networks. SLAAC reduces the ability of an organisation to maintain effective logs of IP address assignment on a
network. For this reason, stateless IP addressing should be avoided.
Security Control: 0521; Revision: 5; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
IPv6 functionality is disabled in dual-stack network devices and ICT equipment unless it is being used.
Security Control: 1186; Revision: 3; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
IPv6 capable network security devices are used on IPv6 and dual-stack networks.
Security Control: 1428; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
Unless explicitly required, IPv6 tunnelling is disabled on all network devices and ICT equipment.
Security Control: 1429; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
IPv6 tunnelling is blocked by network security devices at externally connected network boundaries.
2
Security Control: 1430; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Dynamically assigned IPv6 addresses are configured with Dynamic Host Configuration Protocol (DHCP) version 6 in a
stateful manner with lease information stored in a centralised logging facility.
Network access controls
If an adversary has limited opportunities to connect to a network, they have limited opportunities to compromise that
network. Network access controls not only prevent unauthorised access to a network but also prevent users carelessly
connecting a network to another network.
Network access controls are also useful in segregating information for specific users with a need-to-know or limiting the
flow of information between network segments. For example, computer management traffic can be permitted
between workstations and systems used for administration purposes but not permitted between standard user
workstations.
Security Control: 0520; Revision: 6; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Network access controls are implemented on networks to prevent the connection of unauthorised network devices.
Security Control: 1182; Revision: 3; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Network access controls are implemented to limit traffic within and between network segments to only those that are
required for business purposes.
Security Control: 1427; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Internet Engineering Task Force (IETF) Best Current Practice (BCP) 38 is implemented on networks.
Accounting for network devices
Maintaining and regularly auditing an inventory of authorised network devices can assist in determining whether
devices such as switches, routers, wireless access points and internet dongles on a network or connected directly to
workstations are rogue or not. The use of automated discovery and mapping tools can assist in this process.
Security Control: 1301; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
An inventory of authorised network devices is maintained and regularly audited to detect the presence of any rogue
network devices.
Default accounts for network devices
Network devices can come pre-configured with default credentials. For example, wireless access points with an
administrator account named ‘admin’ and a passphrase of ‘admin’ or ‘password’. Ensuring default accounts are
disabled, renamed or have their passphrase changed can assist in reducing the likelihood of their exploitation by an
adversary.
Security Control: 1304; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
Default accounts for network devices are disabled, renamed or have their passphrase changed.
Disabling unused physical ports on network devices
Disabling unused physical ports on network devices such as switches, routers and wireless access points reduces the
opportunity for an adversary to connect to a network if they can gain physical access to network devices.
Security Control: 0534; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
Unused physical ports on network devices are disabled.
3
Functional separation between servers
Implementing functional separation between servers can reduce the security risk that a server compromised by an
adversary will pose an increased security risk to other servers.
Security Control: 0385; Revision: 6; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Servers maintain effective functional separation with other servers allowing them to operate independently.
Security Control: 1479; Revision: 0; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Servers minimise communications with other servers at both the network and file system level.
Functional separation between server-side computing environments
Software-based isolation mechanisms are commonly used to share a physical server’s hardware among multiple
computing environments. The benefits of using software-based isolation mechanisms to share a physical server’s
hardware include increasing the range of activities that it can be used for and maximising the utilisation of its hardware.
A computing environment could consist of an entire operating system installed in a virtual machine where the isolation
mechanism is a hypervisor, as is commonly used in cloud services providing Infrastructure as a Service. Alternatively, a
computing environment could consist of an application which uses the shared kernel of the underlying operating
system of the physical server where the isolation mechanisms are application containers or application sandboxes, as is
commonly used in cloud services providing Platform as a Service. The logical separation of data within a single
application, which is commonly used in cloud services providing Software as a Service, is not considered to be the same
as multiple computing environments.
An adversary who has compromised a single computing environment, or who legitimately controls a single computing
environment, might exploit a misconfiguration or security vulnerability in the isolation mechanism to compromise other
computing environments on the same physical server, or compromise the underlying operating system of the physical
server.
Security Control: 1460; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
When using a software-based isolation mechanism to share a physical server’s hardware:
the isolation mechanism is from a vendor that uses secure coding practices and, when security vulnerabilities have
been identified, develops and distributes patches in a timely manner
the configuration of the isolation mechanism is hardened by removing unneeded functionality and restricting
access to the administrative interface used to manage the isolation mechanism
the underlying operating system running on the server is hardened
patches are applied to the isolation mechanism and underlying operating system in a timely manner
integrity and log monitoring are performed for the isolation mechanism and underlying operating system in a
timely manner.
Security Control: 1461; Revision: 1; Updated: Sep-18; Applicability: P, S, TS; Priority: Must
When using a software-based isolation mechanism to share a physical server’s hardware, the physical server and all
computing environments running on the physical server are of the same classification.
Management traffic
Implementing security measures specifically for management traffic provides another layer of defence on a network
should an adversary find an opportunity to connect to that network. This also makes it more difficult for an adversary to
enumerate a network.
Security Control: 1006; Revision: 6; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Security measures are implemented to prevent unauthorised access to network management traffic.
4
Use of Simple Network Management Protocol
The Simple Network Management Protocol (SNMP) can be used to monitor the status of network devices such as
switches, routers and wireless access points. The first two iterations of SNMP were inherently insecure as they used
trivial authentication methods. Furthermore, changing all default SNMP community strings on network devices and
limiting access to read-only access is strongly encouraged.
Security Control: 1311; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
SNMP version 1 and 2 are not used on networks.
Security Control: 1312; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
All default SNMP community strings on network devices are changed and have write access disabled.
Using Network-based Intrusion Detection and Prevention Systems
A Network-based Intrusion Detection System (NIDS) or Network-based Intrusion Prevention System (NIPS), when
configured correctly and supported by suitable processes and resources, can be an effective way of identifying and
responding to known intrusion profiles.
In addition, generating alerts for information flows that contravene any rule in a firewall rule set can help security
personnel respond to suspicious or malicious traffic entering a network due to a failure or configuration change to
firewalls.
Security Control: 0576; Revision: 6; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
An intrusion detection and prevention strategy is developed and implemented that includes:
network-based intrusion detection and prevention
procedures and resources for maintaining detection signatures
procedures and resources for the analysis of event logs and real-time alerts
procedures and resources for responding to detected cyber security incidents
the frequency for review of intrusion detection and prevention procedures and resourcing.
Security Control: 1028; Revision: 6; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
NIDS or NIPS are deployed in all gateways between an organisation’s networks and other networks they do not manage,
including public network infrastructure.
Security Control: 1030; Revision: 6; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
NIDS or NIPS in gateways are located immediately inside the outermost firewall and configured to generate a log entry,
and an alert, for any information flows that contravene any rule in firewall rule sets.
Security Control: 1185; Revision: 3; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
When deploying NIDS or NIPS in non-internet gateways, they are configured to monitor unusual patterns of behaviour
or traffic flows rather than internet-based communication protocol signatures.
Further information
Further information on wireless networks can be found in the Wireless networks section of these guidelines.
For information on event logging and auditing can be found in the Event logging and auditing section of the
Guidelines for system monitoring.
Further information on gateways can be found in the Guidelines for connecting networks and security domains.
5
Further information on network segmentation and segregation can be found in the Australian Cyber Security Centre
(ACSC)’s Implementing Network Segmentation and Segregation publication at
https://www.acsc.gov.au/publications/protect/Network_Segmentation_Segregation.pdf.
Further information on network plans can be found in the United States’ National Security Agency’s Manageable
Network Plan Guide (version 4.0) publication at https://apps.nsa.gov/iaarchive/library/ia-guidance/securityconfiguration/networks/manageable-network-plan.cfm.
Further information on IETF BCP 38, Network Ingress Filtering: Defeating Denial of Service Attacks which employ
IP Source Address Spoofing, is available at https://tools.ietf.org/html/bcp38.
Wireless networks
Choosing wireless access points
Wireless access points that have been certified against a Wi-Fi Alliance certification program provide an organisation
with the assurance that they conform to wireless standards. Deploying wireless access points that are guaranteed to be
interoperable with other wireless access points will prevent any problems on a wireless network.
Security Control: 1314; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
All wireless access points are Wi-Fi Alliance certified.
Wireless networks for public access
When an organisation provides a wireless network for the general public, connecting such a wireless network to, or
sharing infrastructure with, any other network creates an additional entry point for an adversary to target connected
networks to steal information or disrupt services.
Security Control: 0536; Revision: 6; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
Wireless networks provided for the general public to access are segregated from all other networks.
Administrative interfaces for wireless access points
Administrative interfaces allow users to modify the configuration and security settings of wireless access points. Often
wireless access points, by default, allow users to access the administrative interface over methods such as fixed
network connections, wireless network connections and serial connections. Disabling the administrative interface for
wireless network connections on wireless access points will assist in preventing unauthorised connections.
Security Control: 1315; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
The administrative interface on wireless access points is disabled for wireless network connections.
Default Service Set Identifiers
Some wireless access points come with a default Service Set Identifier (SSID) which is used to identify a wireless
network. As the default SSIDs of wireless access points are often documented on online forums, along with default
accounts and passphrases, it is important to change the default SSID of wireless access points.
When changing the default SSID, it is important that the new SSID does not bring undue attention to an organisation’s
wireless network. In doing so, the SSID of a wireless network should not be readily associated with an organisation, the
location of their premises or the functionality of the wireless network.
A method commonly recommended to lower the profile of a wireless network is disabling SSID broadcasting. While this
ensures that the existence of the wireless networks is not broadcast overtly using beacon frames, the SSID is still
broadcast in probe requests, probe responses, association requests and re-association requests. As such, it is easy to
determine the SSID of the wireless network by capturing these requests and responses. By disabling SSID broadcasting,
organisations will make it more difficult for users to connect to a wireless network. Furthermore, an adversary could
6
configure a malicious wireless access point to broadcast the same SSID as the hidden SSID used by a legitimate wireless
network, thereby fooling users or devices into automatically connecting to the adversary’s malicious wireless access
point instead. In doing so, the adversary could steal authentication credentials in order to gain access to the legitimate
wireless network. For these reasons, it is recommended organisations enable SSID broadcasting.
Security Control: 1316; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
The default SSID of wireless access points is changed.
Security Control: 1317; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
The SSID of a non-public wireless network is not readily associated with an organisation, the location of their premises
or the functionality of the wireless network.
Security Control: 1318; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
SSID broadcasting is enabled on wireless networks.
Static addressing
Assigning static IP addresses for devices accessing wireless networks can prevent a rogue device when connecting to a
wireless network from being assigned a routable IP address. However, some adversaries will be able to determine IP
addresses of legitimate users and use this information to guess or spoof valid IP address ranges for wireless networks.
Configuring devices to use static IP addresses introduces a management overhead without any tangible security
benefit.
Security Control: 1319; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Static addressing is not used for assigning IP addresses on wireless networks.
Media Access Control address filtering
Devices that connect to wireless networks generally have a unique Media Access Control (MAC) address. As such, it is
possible to use MAC address filtering on wireless access points to restrict which devices can connect to a wireless
network. While this approach will introduce a management overhead for configuring whitelists of approved MAC
addresses, it can prevent rogue devices from connecting to a wireless network. However, some adversaries will be able
to determine valid MAC addresses of legitimate users already on a wireless network. Adversaries can then use this
information to spoof valid MAC addresses and gain access to the wireless network. MAC address filtering introduces a
management overhead without any tangible security benefit.
Security Control: 1320; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
MAC address filtering is not used to restrict which devices can connect to wireless networks.
802.1X authentication
When an organisation chooses to deploy a wireless network, a number of Extensible Authentication Protocol (EAP)
methods that are supported by the Wi-Fi Protected Access 2 (WPA2) protocol can be chosen. These EAP methods
include WPA2-Enterprise with Extensible Authentication Protocol-Transport Layer Security (EAP-TLS), WPA2-Enterprise
with Extensible Authentication Protocol-Tunnelled Transport Layer Security (EAP-TTLS) or WPA2-Enterprise with
Protected Extensible Authentication Protocol (PEAP).
WPA2-Enterprise with EAP-TLS is considered one of the most secure EAP methods. Furthermore, due to its inclusion in
the initial release of the WPA2 standard, it enjoys wide support in wireless access points and operating systems. EAPTLS uses a public key infrastructure (PKI) to secure communications between devices and a Remote Access Dial-In User
Service (RADIUS) server through the use of x.509 certificates. While EAP-TLS provides strong mutual authentication, it
requires an organisation to have established a PKI. This involves deploying their own certificate authority and issuing
certificates, or purchasing certificates from a commercial certificate authority, for every device that accesses the
wireless network. While this introduces additional costs and management overheads, the security advantages are
significant.
7
Security Control: 1321; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
WPA2-Enterprise with EAP-TLS is used to perform mutual authentication for wireless networks.
Evaluation of 802.1X authentication implementation
The security of 802.1X authentication is dependent on three main elements and how they interact with each other.
These three elements include supplicants (clients) that support the 802.1X authentication protocol; authenticators
(wireless access points) that facilitate communication between supplicants and the authentication server; and the
RADIUS server that is used for authentication, authorisation and accounting purposes. To provide assurance that these
elements have been implemented correctly, supplicants, authenticators and the authentication server should have
completed an evaluation.
Security Control: 1322; Revision: 2; Updated: Sep-18; Applicability: P, S, TS; Priority: Must
Supplicants, authenticators and the authentication server used in wireless networks have completed an Australian
Signals Directorate (ASD) Cryptographic Evaluation (ACE).
Generating and issuing certificates for authentication
When issuing a certificate to a device in order to access a wireless network, organisations should be aware that it could
be stolen by malicious code. Once compromised, the certificate could be used on other devices to gain unauthorised
access to the wireless network it was issued for. Organisations should also be aware that in only issuing a certificate to
a device, any actions taken by a user will only be attributable to a device and not a specific user.
When issuing a certificate to a user in order to access a wireless network, it can be in the form of a certificate that is
stored on a device or a certificate that is stored within a smart card. Issuing certificates on smart cards provides
increased security, but at a higher cost. Specifically, a user is more likely to notice a missing smart card and alert their
security team, who are then able to revoke the credentials on the RADIUS server, which can minimise the time an
adversary has access to the wireless network. In addition, to reduce the likelihood of a stolen smart card from being
used to gain unauthorised access to a wireless network, two-factor authentication can be implemented through the use
of personal identification numbers (PINs) on smart cards. This is particularly important when a smart card grants a user
any form of administrative access.
Security Control: 1324; Revision: 2; Updated: Sep-18; Applicability: P, S, TS; Priority: Must
Certificates are generated using certificate authority software or a hardware security module that has completed an
ACE.
Security Control: 1323; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Both device and user certificates are required for accessing wireless networks.
Security Control: 1325; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
Both device and user certificates for accessing wireless networks are not stored on the same device.
Security Control: 1326; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
User certificates for accessing wireless networks are issued on smart cards with access PINs.
Security Control: 1327; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
User or device certificates stored on devices accessing wireless networks are protected by encryption.
Caching 802.1X authentication outcomes
When 802.1X authentication is used, a shared secret key known as the Pairwise Master Key (PMK) is generated. Upon
successful authentication of a device, the PMK is capable of being cached to assist with fast roaming between wireless
access points. When a device roams away from a wireless access point that it has authenticated to, it will not need to
perform a full re-authentication should it roam back while the cached PMK remains valid. To further assist with
roaming, wireless access points can be configured to pre-authenticate a device to other neighbouring wireless access
points that the device might roam to. Although requiring full authentication for a device each time it roams between
8
wireless access points is ideal, organisations can choose to use PMK caching and pre-authentication if they have a
business requirement for fast roaming. If PMK caching is used, the PMK caching period should not be set to greater
than 1440 minutes (24 hours).
Security Control: 1330; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
The PMK caching period is not set to greater than 1440 minutes (24 hours).
Remote Authentication Dial-In User Service authentication
Separate to the 802.1X authentication process is the RADIUS authentication process that occurs between wireless
access points and a RADIUS server. To protect authentication information communicated between wireless access
points and a RADIUS server, communications should be encapsulated with an additional layer of encryption.
Security Control: 1454; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Communications between wireless access points and a RADIUS server are encapsulated with an additional layer of
encryption.
Encryption
As wireless transmissions are capable of radiating outside of secured areas, organisations cannot rely on the traditional
approach of physical security to protect against unauthorised access to information on wireless networks. As such, all
information communicated over wireless networks should be encrypted using a suitable encryption protocol.
Specifically, the Advanced Encryption Standard (AES)-based Counter Mode Cipher Block Chaining Message
Authentication Code Protocol (CCMP) introduced in WPA2.
Security Control: 1332; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Must
CCMP is used to protect the confidentiality and integrity of all wireless network traffic.
Security Control: 0543; Revision: 6; Updated: Sep-18; Applicability: P; Priority: Must
Cryptographic equipment that has completed an ACE is used if an organisation wishes to communicate classified
information over a wireless network.
Security Control: 1445; Revision: 1; Updated: Sep-18; Applicability: S, TS; Priority: Must
High assurance cryptographic equipment (HACE) is used if an organisation wishes to communicate highly classified
information over a wireless network.
Interference between wireless networks
Where multiple wireless networks are deployed in close proximity, there is the potential for interference to impact the
availability of a wireless network, especially when operating on commonly used 802.11b/g (2.4 GHz) default channels of
1 and 11. Sufficiently separating wireless networks through the use of frequency separation can help reduce this
security risk. This can be achieved by using wireless networks that are configured to operate on channels that minimise
overlapping frequencies or by using both 802.11b/g (2.4 GHz) channels and 802.11n (5 GHz) channels. It is important to
note though, if implementing a mix of 2.4 GHz and 5 GHz channels, not all devices may be compatible with 802.11n and
able to connect to 5 GHz channels.
Security Control: 1334; Revision: 2; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Wireless networks implement sufficient frequency separation from other wireless networks.
Protecting management frames on wireless networks
An effective denial of service can be performed by exploiting unprotected management frames using inexpensive
commercial hardware. The 802.11 standard provides no protection for management frames and therefore does not
prevent spoofing or denial of service activities. However, the 802.11w amendment specifically addresses the protection
of management frames on wireless networks and should be enabled.
9
Security Control: 1335; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Wireless access points enable the use of the 802.11w amendment to protect management frames.
Wireless network footprint
Instead of deploying a small number of wireless access points that broadcast on high power, a greater number of
wireless access points that use less broadcast power can be deployed to achieve the desired footprint. This has the
benefit of providing service continuity should a wireless access point become unserviceable. In such a case, the output
power of nearby wireless access points can be increased to cover the footprint gap until the unserviceable wireless
access point can be replaced.
In addition to minimising the output power of wireless access points to reduce the footprint of a wireless network, the
use of Radio Frequency (RF) shielding can be used for an organisation’s premises. While expensive, this will limit the
wireless communications to areas under the control of an organisation. RF shielding on an organisation’s premises has
the added benefit of preventing the jamming of wireless networks from outside of the premises in which wireless
networks are operating.
Security Control: 1338; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS; Priority: Should
Instead of deploying a small number of wireless access points that broadcast on high power, a greater number of
wireless access points that use less broadcast power are deployed to achieve the desired footprint.
Security Control: 1013; Revision: 5; Updated: Sep-18; Applicability: S, TS; Priority: Should
The effective range of wireless communications outside an organisation’s area of control is limited by implementing RF
shielding on buildings in which wireless networks are used.
Further information
Further information on implementing segregation using VLANs can be found in the Network design and
configuration section of these guidelines.
Further information on selecting evaluated products can be found in the Evaluated product acquisition section of the
Guidelines for evaluated products.
Further information on encryption for wireless networks can be found in the Guidelines for using cryptography.
Information on Wi-Fi Alliance certification programs can be obtained from https://www.wifi.org/certification/programs.
Further information on EAP-TLS can be found in IETF Request for Comments (RFC) 5216, The EAP-TLS Authentication
Protocol, at https://tools.ietf.org/html/rfc5216.
Service continuity for online services
Denial-of-service attacks
Denial-of-service attacks are designed to disrupt or degrade online services such as website, email and Domain Name
System (DNS) services. To achieve this goal, adversaries may use a number of approaches to deny access to legitimate
users of online services:
using multiple computers to direct a large volume of unwanted network traffic at online services in an attempt to
consume all available network bandwidth
using multiple computers to direct tailored traffic at online services in an attempt to consume the processing
resources of online services
hijacking online services in an attempt to redirect legitimate users away from those services to other services that
the adversary controls.
10
Although an organisation cannot avoid being targeted by denial-of-service attacks, there are a number of measures
they can implement to prepare for and potentially reduce the impact if targeted. Preparing for denial-of-service attacks
before they occur is by far the best strategy, it is very difficult to respond once they begin and efforts at this stage are
unlikely to be effective.
Determining essential online services
Not all online services or functionality offered by an organisation may be business critical. Understanding what services
can be offered with reduced functionality, deprioritised, disabled or lived without can help an organisation reduce or
eliminate the impact on other more essential services or free up resources to respond to more critical services first.
Security Control: 1458; Revision: 1; Updated: Sep-18; Applicability: O, P; Priority: Should
The functionality and quality of online services, how to maintain such functionality, and what functionality can be lived
without during a denial-of-service attack, are determined and documented.
Service provider denial of service strategies
The volume of network traffic that can be achieved by an adversary using a botnet or an amplification-based denial-ofservice attack can overwhelm the bandwidth of an organisation’s internet connection. Assistance from service
providers who have the ability to block network traffic upstream from a targeted service or organisation is essential.
Security Control: 1431; Revision: 1; Updated: Sep-18; Applicability: O, P; Priority: Should
Denial-of-service attack prevention and mitigation strategies are discussed with service providers, specifically:
their capacity to withstand denial-of-service attacks
any costs likely to be incurred by customers resulting from denial-of-service attacks
thresholds for notifying customers or turning off their online services during denial-of-service attacks
pre-approved actions that can be undertaken during denial-of-service attacks
denial-of-service attack prevention arrangements with upstream providers to block malicious traffic as far
upstream as possible.
Domain name registrar locking
The use of domain name registrar locking can prevent a denial of service caused by unauthorised deletion or transferal
of a domain, or other unauthorised modification of a domain’s registration details.
Security Control: 1432; Revision: 1; Updated: Sep-18; Applicability: O, P; Priority: Should
Domain names for online services are protected via registrar locking and confirming domain registration details are
correct.
Establishing contact details with service providers
Proper and timely communication is essential in responding to a denial-of-service attack, particularly since normal
means of communication such as corporate email or websites may be unavailable or degraded during a denial-ofservice attack.
Security Control: 1433; Revision: 1; Updated: Sep-18; Applicability: O, P; Priority: Should
24x7 contact details are maintained for service providers and service providers maintain 24x7 contact details for their
customers.
Security Control: 1434; Revision: 1; Updated: Sep-18; Applicability: O, P; Priority: Should
Organisations and service providers provide each other with additional out-of-band contact details for use when normal
communication channels fail.
11
Monitoring with real-time alerting for online services
Organisations should perform automated monitoring of online services with real-time alerting to ensure that a denialof-service attack is detected and responded to as soon as possible.
Security Control: 1435; Revision: 1; Updated: Sep-18; Applicability: O, P; Priority: Should
Availability monitoring with real-time alerting is implemented to detect denial-of-service attacks and measure their
impact.
Segregation of critical online services
Denial-of-service attacks are typically focused on highly visible online services, such as an organisation’s core website,
in order to have a publically noticeable impact. By segregating online services (e.g. having one internet connection for
email and internet access and a separate connection for web hosting services) the impact of a denial-of-service attack
can be limited to just a targeted service.
Security Control: 1436; Revision: 1; Updated: Sep-18; Applicability: O, P; Priority: Should
Critical online services are segregated from other online services that are more likely to be targeted.
Preparing for service continuity
Depending on the nature of a denial-of-service attack, replacing a full featured website with a minimal impact static
version can help provide a level of service or information to customers which would otherwise not be possible.
An organisation’s standard full featured website may have higher processing or resource demands due to database
integration or the presence of large media files such as high-resolution images or videos. These additional resource
requirements may make the website more susceptible to denial-of-service attacks.
Security Control: 1518; Revision: 0; Updated: Sep-18; Applicability: O, P; Priority: Should
A static version of a website is pre-prepared that requires minimal processing and bandwidth in order to facilitate at
least a basic level of service when under a denial-of-service attack.
Cloud-based hosting of online services
Using a cloud hosting provider can allow an organisation to build highly resilient online services due to the increased
computing resources, bandwidth and multiple separate physical sites made available by the cloud provider.
Organisations can achieve the same results using their own infrastructure; however, this may require significant upfront
costs and may still result in a limited capability to scale dynamically to meet increased demand. In case of a denial-ofservice attack, cloud-based hosting can also provide segregation from self-hosted or other cloud hosted services
ensuring that other systems, such as email services, are not affected.
Security Control: 1437; Revision: 2; Updated: Sep-18; Applicability: O, P; Priority: Should
A cloud service provider, preferably multiple different cloud service providers, is used for hosting online services.
Using content delivery networks and denial of service mitigation services
Similar to cloud-based hosting, the use of content delivery networks (CDNs) and denial of service mitigation services
can allow an organisation to create highly resilient online services by leveraging the large bandwidth, geographically
dispersed hosting locations, traffic scrubbing and other security controls offered by CDN and denial of service
mitigation service providers.
The use of CDNs is particularly effective when serving static, bandwidth intensive media such as images, sound or video
files. However, the services offered by a CDN can include more than basic content hosting such as web response
caching, load balancing, web application security controls or denial of service mitigations.
12
Care should be taken when configuring the use of a CDN or denial of service mitigation service to ensure that the IP
address of the organisation’s web server is not identifiable by an adversary as this could allow for the benefits and
protections offered by the service provider to be bypassed. Additionally, appropriate network security controls should
be applied to only allow communication between an organisation’s server, the service provider and the authorised
management environment.
Security Control: 1438; Revision: 1; Updated: Sep-18; Applicability: O, P; Priority: Should
Where a high availability requirement exists for website hosting, CDNs that cache websites are used.
Security Control: 1439; Revision: 1; Updated: Sep-18; Applicability: O, P; Priority: Should
If using a CDN, disclosing the IP address of the web server under the organisation’s control (referred to as the origin
server) is avoided and access to the origin server is restricted to the CDN and an authorised management network.
Security Control: 1441; Revision: 1; Updated: Sep-18; Applicability: O, P; Priority: Should
Where a requirement for high availability exists for online services, a denial of service mitigation service is used.
13