Federal agencies have requirements for wireless security in both the classified and unclassified areas of their facilities.
In classified areas, the mere presence of a phone or other electronic device may be sufficient to require an alert. In all areas, a rogue device exfiltrating sensitive data should be reported in real time.
Consequently, federal agencies are interested to understand employee, contractor and visitor behavior and what types of devices are entering their offices and campuses.
THE CURRENT SITUATION
Currently federal agencies do not have an all-inclusive view into the wireless devices and traffic in their environments. In order to protect from the emerging threats associated with the wireless spectrum, and most prevalently cellular, Wi-Fi and Bluetooth devices, campuses must first recognize the devices and protocols in their airspace.
Understanding the devices associated with employees, contractors and visitors gives a view into the insider threat scenario. Rogue devices, data exfiltration, misconfigured equipment, and insider threats are all possible via nefarious devices.
Facility/Campus/Headquarters Wireless Security Vulnerabilities include:
Individuals in unauthorized areas
Wireless threat surface associated with the devices in the RF spectrum
Improperly configured devices which can leave an open gateway for attackers to eavesdrop on activities and other nefarious activities
THE REQUIREMENTS FOR A FACILITY RADIO SECURITY SOLUTION
A campus facility radio security solution needs to:
Provide visibility into the wireless networks, traffic, and devices operating in your environment,
Deliver real time and accurate locations for all devices
Inform you of the attack surface for each of these devices,
Alert on active wireless attacks on those devices through your existing SIEM, Incident Alert and/or other systems
Specifically, a solution must:
Detect all devices operating in the wireless spectrum, to include but not limited to, Wi-Fi, Cellular, Bluetooth, and the hundreds of other protocols in the Internet of Things (IoT)
Provide awareness into any wireless threats including active attacks, rogue networks, and misconfigured devices
Track the movement of wireless enabled to augment existing security measures
Show the movements of devices to help enforce access policies
Enforce agency BYOD/IoT policy
Detect unauthorized access
Detect data exfiltration through wireless devices
Allow the physical security to quickly detect and localize any malicious devices
Include geofencing capabilities to understand and protect areas with sensitive data
Integrate with video surveillance systems
Use open standards based APIs to permit integration with existing systems, allowing monitoring via the existing single pane of glass in use by the agency today
Bastille Cellular Intrusion Detection
Cellular, Wi-Fi & Bluetooth
Since 2016 when it first contracted with the Department of Homeland Security to help protect the Nation’s critical infrastructure from the threats associated with the IoT, Bastille has been first to market with innovative and affordable RF security solutions.
Bastille’s patented Cellular Intrusion Detection solution advances science and practice delivering the first solution which can accurately detect and locate cell phones inside an agency’s facilities using just their cellular signal. In addition, as Bastille also locates Wi-Fi and Bluetooth, it will accurately locate any mobile device or infrastructure component using those protocols, whether its authorized or rogue. This broad situational awareness is extended to action with real time alerts through either Bastille or your existing system of choice using open standards based API integrations.
For more details about Bastille’s Cellular Intrusion Detection solution, click here.