Content library
Julkri: TL IV-I
TEK-05: Langaton tiedonsiirto

How to fill the requirement

Julkri: TL IV-I

TEK-05: Langaton tiedonsiirto

Task name
Priority
Status
Theme
Policy
Other requirements
Langattomien yhteyksien salaaminen
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Encryption
requirements

Task is fulfilling also these other security requirements

TEK-05: Langaton tiedonsiirto
Julkri
1. Task description

When wireless connections are used instead of physical ones (e.g. WLAN, Bluetooth), the connection is interpreted as leaving the protected area.

In this case, the wireless communication is encrypted with an encryption solution that has no known vulnerabilities and that, according to information received from the manufacturer, supports modern encryption strengths and settings.

Data transfer also includes traffic between peripherals and terminals, i.e. wireless mice, keyboards and headphones. Wireless data transmission (e.g. wireless peripherals) protected less than the requirements for taking place inside a physically protected area can be accepted, if it can be ensured that the confidentiality of the information is not compromised through these connections.

Protection of wireless connections
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Network security
requirements

Task is fulfilling also these other security requirements

I05: Langattomat verkot
Katakri
13.1.2: Security of network services
ISO27 Full
PR.PT-4: Communications and control networks
NIST
TEK-05: Langaton tiedonsiirto
Julkri
8.21: Security of network services
ISO27k1 Full
1. Task description

The use of the wireless network is secured with sufficient keys and the connection traffic to the network router is encrypted. The wireless network for guest use is isolated from the company's own internal network.

No items found.