Wireless Communication Standard


See Purpose.


This standard specifies the technical requirements that wireless infrastructure devices must satisfy to connect to your company's network. Only those wireless infrastructure devices that meet the requirements specified in this standard or are granted an exception by the Suzor IT Team are approved for connectivity to your company's network.

Network devices including, but not limited to, hubs, routers, switches, firewalls, remote access devices, modems, or wireless access points, must be installed, supported, and maintained by a Suzor IT approved support organization. Lab network devices must comply with the Lab Security Policy.


All employees, contractors, consultants, temporary and other workers at your company and its subsidiaries, including all personnel that maintain a wireless infrastructure device on behalf of your company, must comply with this standard. This standard applies to wireless devices that make a connection to the network and all wireless infrastructure devices that provide wireless connectivity to the network.

Suzor IT must approve exceptions to this standard in advance.


General Requirements

All wireless infrastructure devices that connect to your company's network or provide access to Confidential, Highly Confidential, or Restricted information must:

  • Use Extensible Authentication Protocol-Fast Authentication via Secure Tunneling (EAP-FAST), Protected Extensible Authentication Protocol (PEAP), or Extensible Authentication Protocol-Translation Layer Security (EAP-TLS) as the authentication protocol.

  • Use Temporal Key Integrity Protocol (TKIP) or Advanced Encryption System (AES) protocols with a minimum key length of 128 bits.

  • All Bluetooth devices must use Secure Simple Pairing with encryption enabled.

Lab and Isolated Wireless Device Requirements

  • Lab device Service Set Identifier (SSID) must be different from your company's production device SSID.

  • Broadcast of lab device SSID must be disabled.

Home Wireless Device Requirements

All home wireless infrastructure devices that provide direct access to your company's network, such as those behind Enterprise Teleworker (ECT) or hardware VPN, must adhere to the following:

  • Enable WiFi Protected Access Pre-shared Key (WPA-PSK), EAP-FAST, PEAP, or EAP-TLS

  • When enabling WPA-PSK, configure a complex shared secret key (at least 15 characters) on the wireless client and the wireless access point

  • Change the default SSID name
  • Change the default login and password

Policy Compliance

Compliance Measurement

The Suzor IT team will verify compliance to this policy through various methods, including but not limited to, periodic walk-thrus, video monitoring, business tool reports, internal and external audits, and feedback to the policy owner.


Any exception to the policy must be approved by the Suzor IT Team in advance.


An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

Related Standards, Policies, and Processes

  • Lab Security Policy
Was this article helpful?
0 out of 0 found this helpful



Please sign in to leave a comment.