User's Guide

AirTight Management Console User Guide
240
AirTight Management Console provides various compliance reports related to wireless security
vulnerabilities, mandated by federal agencies, and other regulatory agencies. You can generate the
following reports using Reports in AirTight Management Console.
x DoD Directive 8100.2 Compliance Report - The sections of this report list the wireless
vulnerabilities detected in your network and the severity of security risk caused by these
vulnerabilities.
x GLBA Wireless Compliance Report - The 'Gramm-Leach Biley Act' (GLBA) of 1999, mandates
that financial institutions protect the security and confidentiality of the personally identifiable
financial information of their customers.
Section 501(Title V, Subtitle A) of the GLBA seeks to control leakage of customer financial data to
unauthorized users. Federal Trade Commission (FTC) safeguards Rule 16 CFR Part 314.4
specifically describes the elements that every financial institution must include in its information
security program. This report assesses the wireless security posture of the organization and
identifies wireless vulnerabilities that may expose your organization to leakage of customer
financial data.
1.
Part 314.4(a): This section requires the institution to designate employee(s) to coordinate its
information security program. This report establishes that employees are designated to present
customer financial data leakage through wireless.
2.
Part 314.4(b): This section requires the institution to identify risks to the confidentiality and
integrity of customer information that could result in its unauthorized disclosure. Periodic
generation and archival of this GLBA report establishes that your organization has the capabilities
to assess the risk of customer financial data leakage through wireless.
3.
Part 314.4(c): This section requires the institution to design information safeguards and
regularly monitor the effectiveness of such safeguards. Periodic generation and archival of this
GLBA report establishes that your organization has safeguards to prevent financial data leakage
through wireless.
x HIPAA wireless compliance report- The Health Insurance Portability and Accountability Act
(HIPAA) of 1996 by the Department of Health and Human Services (DHHS), mandates that
healthcare organizations must safeguard the privacy and security of patient health information
transmitted electronically.
HIPAA Security Rule 45 CFR seeks to control leakage of patient health data to unauthorized
users. This report assesses the wireless security posture of the organization and identifies wireless
vulnerabilities that may expose your organization to leakage of patient health data.
1. Section 164.308(a)(1): This section requires a security management process to be set up for risk
assessment and management. This HIPAA report is the first step in establishing a security
management process to assess and manage the risk of patient health data leakage through
wireless.
2. Section 164.308(a)(6): This section requires formal documentation and response procedures to
be set up to handle wireless security incidents promptly. Periodic generation and archival of this
HIPAA report establishes that your organization has a formal documentation and rapid response
program to handle incidents related to patient health data leakage through wireless.
3. Section 164.312(e)(1): This section requires patient health data transmitted over wireless
networks to be guarded against unauthorized access. Periodic generation and archival of this
HIPAA report establishes that your organization has the capabilities to monitor, detect and
safeguard against patient health data leakage through wireless.
Since wireless environments change dynamically, it is recommended that you conduct a HIPAA
wireless vulnerability assessment at least once every 15 days. Archive the HIPAA Wireless
Compliance reports. Establish an ongoing wireless security program to fix the top vulnerabilities
and to minimize your wireless security exposure.
The sections of this report list the wireless vulnerabilities detected in your network and the severity
of security risk caused by these vulnerabilities.