Wireless & Physical Security
Permissions Down, Control Up
Attack paths shrink as soon as permissions, segments and management channels are consistently configured.
For Wireless & Physical Security the basis remains the same: less implicit trust and more visibility into anomalous behavior.
This way you limit not only the chance of incidents, but especially the scope and duration when something goes wrong.
Immediate measures (15 minutes)
Why this matters
The core of Wireless & Physical Security is risk reduction in practice. Technical context supports the choice of measures, but implementation and assurance are central.
Wi-Fi Security
Evolution of wireless encryption
| Protocol | Year | Status | Vulnerability | Recommendation |
|---|---|---|---|---|
| WEP | 1997 | Broken | IV collision, RC4 weakness, crackable in minutes | Phase out immediately |
| WPA (TKIP) | 2003 | Broken | TKIP vulnerabilities, Beck-Tews attack | Phase out |
| WPA2-Personal (PSK) | 2004 | Vulnerable | KRACK (2017), offline dictionary attacks on handshake | Only with strong password, migrate to WPA3 |
| WPA2-Enterprise | 2004 | Acceptable | KRACK patched, requires 802.1X/RADIUS | Acceptable with patches and certificate validation |
| WPA3-SAE (Personal) | 2018 | Recommended | Dragonblood (largely patched) | Recommended for PSK environments |
| WPA3-Enterprise | 2018 | Recommended | 192-bit security suite, CNSA-approved | Recommended for business environments |
The golden rule: WPA3-Enterprise with 802.1X/RADIUS for business networks. WPA3-SAE for guest networks and small offices. Anything below that is a security incident that has not yet been discovered.
802.1X/RADIUS for enterprise Wi-Fi
802.1X replaces a shared password with individual authentication. Each user has their own credentials, certificates, or both. This allows you to revoke individual access without changing the password for everyone.
# hostapd configuration for WPA3-Enterprise
# /etc/hostapd/hostapd.conf
interface=wlan0
driver=nl80211
ssid=CORP-SECURE
hw_mode=a
channel=36
# WPA3-Enterprise (IEEE 802.11i with Suite B)
wpa=2
wpa_key_mgmt=WPA-EAP-SUITE-B-192
rsn_pairwise=GCMP-256
group_cipher=GCMP-256
ieee80211w=2 # Management Frame Protection required
beacon_prot=1
# RADIUS
ieee8021x=1
auth_server_addr=10.0.30.10
auth_server_port=1812
auth_server_shared_secret=CHANGE_THIS_SECRET
acct_server_addr=10.0.30.10
acct_server_port=1813
acct_server_shared_secret=CHANGE_THIS_SECRET
# Band steering and roaming
bss_transition=1
rrm_neighbor_report=1
Guest network isolation
Guest networks must be completely isolated from the production network. No shared VLAN, no shared DHCP scope, no routing to internal subnets.
# Separate SSID for guests with dedicated VLAN
# /etc/hostapd/hostapd-guest.conf
interface=wlan0
bss=wlan0_guest
ssid=GUEST-WIFI
wpa=2
wpa_key_mgmt=SAE
rsn_pairwise=CCMP
sae_password=GuestAccess2026
# Isolation
ap_isolate=1 # Clients cannot see each other
bridge=br-guest # Separate bridge interface to VLAN 50
# Firewall: guest network may only reach the internet, not internal
nft add rule inet filter forward iifname "br-guest" oifname "br-corp" drop
nft add rule inet filter forward iifname "br-guest" oifname "eth0" acceptRogue Access Point Detection
A rogue access point is an unauthorized wireless access point on your network. Two variants:
- Internally placed -- an employee who plugs a consumer router under their desk "because the Wi-Fi signal is so weak"
- Evil Twin -- an attacker who sets up an access point with the same SSID as your corporate network to intercept credentials
Wireless Intrusion Prevention System (WIPS)
A dedicated WIPS monitors the radio spectrum and detects unauthorized access points, deauthentication attacks and suspicious probing.
Kismet as periodic scanner
# Run Kismet for rogue AP detection
kismet -c wlan0mon --override datasources=wlan0mon
# Kismet REST API: list all detected APs
curl -s -u admin:changeme \
http://localhost:2501/devices/views/phydot11_accesspoints/devices.json \
| jq '.[] | {ssid: .dot11.device.advertised_ssid_map[].dot11.advertisedssid.ssid,
bssid: .kismet.device.base.macaddr,
channel: .kismet.device.base.channel}'Evil Twin detection
You detect Evil Twin attacks by:
- BSSID monitoring: a second AP with the same SSID but a different MAC address
- Signal strength anomalies: a "corporate AP" that is suddenly much stronger than normal
- Certificate validation: WPA2/3-Enterprise with server certificate pinning prevents clients from connecting to an Evil Twin
Network Access Control (NAC)
NAC determines who and what may be on your network. Without NAC, anyone who plugs a network cable into a wall outlet or connects to Wi-Fi can enter the network.
802.1X wired
# Cisco IOS -- 802.1X on switch ports
aaa new-model
aaa authentication dot1x default group radius
aaa authorization network default group radius
dot1x system-auth-control
interface GigabitEthernet0/1
description Workstation port with 802.1X
switchport mode access
switchport access vlan 10
authentication port-control auto
dot1x pae authenticator
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication timer reauthenticate 3600
mab
FreeRADIUS configuration
# /etc/freeradius/3.0/clients.conf
client switch-core {
ipaddr = 10.0.30.254
secret = RADIUS_SHARED_SECRET
nastype = cisco
}
# /etc/freeradius/3.0/sites-enabled/default
# EAP-TLS authentication (certificates)
authorize {
eap {
default_eap_type = tls
}
}
# /etc/freeradius/3.0/mods-enabled/eap
eap {
default_eap_type = tls
tls-config tls-common {
private_key_file = /etc/freeradius/3.0/certs/server.key
certificate_file = /etc/freeradius/3.0/certs/server.pem
ca_file = /etc/freeradius/3.0/certs/ca.pem
check_cert_cn = %{User-Name}
}
}Managing MAB (MAC Authentication Bypass) safely
MAB is a fallback for devices that do not support 802.1X: printers, IP phones, IoT sensors. The MAC address is sent as username and password to RADIUS. MAB is not secure -- MAC addresses are trivially spoofable -- but it is better than no control. Devices that authenticate via MAB should be in a restricted VLAN with strict ACLs.
Bluetooth & IoT
Bluetooth and IoT devices represent a growing attack surface that often falls outside the IT department's visibility.
BLE sniffing
# Ubertooth One: Bluetooth Low Energy sniffing
ubertooth-btle -f -c /tmp/ble-capture.pcap
# nRF Sniffer: capture BLE traffic
nrf_sniffer_ble --extcap-interface /dev/ttyACM0 --fifo /tmp/ble.pcapIoT segmentation best practices
| Measure | Description | Priority |
|---|---|---|
| Separate VLAN | All IoT devices in a dedicated VLAN | Critical |
| No default credentials | Always change factory passwords | Critical |
| Firmware updates | Automatic or scheduled, not "never" | High |
| Outbound filtering | IoT may only reach specific cloud endpoints | High |
| Monitoring | Log network traffic from IoT devices | Medium |
| Inventory | Know which IoT devices exist | Medium |
Zigbee and Z-Wave
Zigbee networks often use the default trust center link key
(ZigBeeAlliance09). Any sniffer with a CC2531 USB dongle
can decode the traffic. Change the link key, use Zigbee 3.0 with
Install Codes, and segment the network.
Physical Access Control
The best firewall in the world does not help if someone with a stolen badge can walk into the server room.
Layers of physical security
| Layer | Means | Purpose |
|---|---|---|
| Perimeter | Fencing, barriers, security guards | Unauthorized access to premises |
| Building | Badge system, reception, visitor registration | Unauthorized access to building |
| Department | Badge per floor/department, glass walls | Lateral movement within building |
| Server room | Biometrics + badge, mantrap, camera | Access to critical infrastructure |
| Rack | Rack lock, individual logging | Access to specific hardware |
Preventing tailgating
Tailgating -- following through a secured door behind an authorized person -- is the most effective physical attack. Defenses:
- Mantraps/Airlocks: airlocks where only one person can pass through at a time
- Turnstiles with badge scan: physical one-person-at-a-time enforcement
- Culture: employees must be trained to check badges and challenge visitors
- Cameras with analytics: detection of multiple people going through a door simultaneously
Server room security
- Access logging: who was in the server room when, with audit trail
- Cameras: visible and with storage of at least 90 days
- Climate control: monitor temperature and humidity, alerts on deviations
- Fire detection: gas suppression system (FM-200/Novec) instead of water
- Emergency power: UPS and generator with regular tests
USB & Removable Media
In 2008, a USB stick was found in a parking lot of a U.S. military base in the Middle East. Someone plugged it into a computer. The malware -- later named Agent.btz -- spread through the entire classified network of the Pentagon. It took fourteen months to clean up. The operation was named Buckshot Yankee and led to the establishment of US Cyber Command.
A USB stick in a parking lot. Fourteen months of cleanup.
Managing USB risks
| Attack | Description | Risk |
|---|---|---|
| USB Rubber Ducky | Emulates a keyboard, types commands in milliseconds | Arbitrary code execution |
| BadUSB | Firmware attack that turns any USB device into an attack platform | Undetectable by traditional AV |
| USB drop attack | Leaving infected sticks in parking lots | Social engineering + malware |
| USB killer | Sends high voltage back through the USB port | Hardware destruction |
USB blocking via Group Policy (Windows)
# GPO: Block USB storage
# Computer Configuration > Administrative Templates > System > Removable Storage Access
# Via registry (directly applicable):
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\RemovableStorageDevices\{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}" `
-Name "Deny_All" -Value 1 -Type DWord
# More specific approach: only block USB Mass Storage
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\USBSTOR" `
-Name "Start" -Value 4 -Type DWord # 4 = disabled
# Whitelist specific USB devices via Device Installation Restrictions
# Computer Configuration > Admin Templates > System > Device Installation > Device Installation Restrictions
# "Allow installation of devices that match any of these device IDs"USB blocking via udev (Linux)
# /etc/udev/rules.d/99-usb-block.rules
# Block all USB mass storage devices
ACTION=="add", SUBSYSTEMS=="usb", DRIVERS=="usb-storage", \
RUN+="/bin/sh -c 'echo 0 > /sys$DEVPATH/authorized'"
# Whitelist: allow specific USB device based on vendor:product
ACTION=="add", SUBSYSTEMS=="usb", ATTRS{idVendor}=="0781", ATTRS{idProduct}=="5581", \
RUN+="/bin/sh -c 'echo 1 > /sys$DEVPATH/authorized'"
# Reload udev rules
udevadm control --reload-rules && udevadm triggerEndpoint Detection
Modern EDR solutions detect USB Rubber Ducky attacks by looking for: - HID devices that generate thousands of keystrokes per second - USB devices that register as both a keyboard and a storage device simultaneously - Unknown USB vendor/product ID combinations
Clean Desk & Dumpster Diving
Clean desk is not a housekeeping measure. It is a security measure. Post-its with passwords on monitors, login credentials on whiteboards, confidential documents in the printer tray -- these are all data leaks that no technical control can prevent.
Clean desk policy
- Lock screens: automatic lockout after 5 minutes of inactivity
- Store documents: confidential papers in lockable cabinets
- Printers: secure printing with badge authentication (pull printing)
- Whiteboards: photograph and erase after meetings
- Waste disposal: cross-cut shredders (P-4 or higher) for paper, degaussing or physical destruction for media
Enforcing screen lock
# GPO: Screensaver with password after 300 seconds (5 minutes)
Set-ItemProperty -Path "HKCU:\Control Panel\Desktop" -Name "ScreenSaveTimeOut" -Value "300"
Set-ItemProperty -Path "HKCU:\Control Panel\Desktop" -Name "ScreenSaverIsSecure" -Value "1"
Set-ItemProperty -Path "HKCU:\Control Panel\Desktop" -Name "ScreenSaveActive" -Value "1"# Linux: automatic screen lock via GNOME
gsettings set org.gnome.desktop.session idle-delay 300
gsettings set org.gnome.desktop.screensaver lock-enabled true
gsettings set org.gnome.desktop.screensaver lock-delay 0Dumpster diving
Dumpster diving -- searching through waste for usable information -- is legal in most jurisdictions and stunningly effective. Organizations routinely discard: internal phone directories, organization charts, network diagrams, printouts of emails, hardcopy of password resets, and printed configurations.
Defense: cross-cut shredders on every floor, awareness among employees, and contractual agreements with the cleaning company about waste disposal.
Checklist
| # | Measure | Priority | Status |
|---|---|---|---|
| 1 | WPA3-Enterprise or WPA3-SAE on all wireless networks | Critical | [ ] |
| 2 | WEP and WPA disabled, WPA2 only with 802.1X | Critical | [ ] |
| 3 | Guest network on separate VLAN, no routing to internal | Critical | [ ] |
| 4 | Default credentials changed on all access points | Critical | [ ] |
| 5 | 802.1X on wired switch ports | High | [ ] |
| 6 | Periodic scan for rogue access points | High | [ ] |
| 7 | IoT devices on separate VLAN with strict ACLs | High | [ ] |
| 8 | USB mass storage blocked via GPO/udev | High | [ ] |
| 9 | Server room with badge + logging + camera | High | [ ] |
| 10 | Anti-tailgating measures at secured entrances | High | [ ] |
| 11 | Automatic screen lock after 5 minutes | Medium | [ ] |
| 12 | Cross-cut shredders available on every department | Medium | [ ] |
| 13 | Secure printing (pull printing) with badge | Medium | [ ] |
| 14 | MAB devices in restricted VLAN with monitoring | Medium | [ ] |
| 15 | Bluetooth and BLE devices inventoried | Medium | [ ] |
The beauty of the TJX case is the timeline. The attack began in July 2005. The company discovered it in December 2006. For eighteen months the sniffers sat on the payment terminals, while every debit card that went through a reader was copied to a server in Eastern Europe. The company had firewalls. It had antivirus software. It had a security policy. What it did not have was a proper wireless network. One WEP network in a parking garage.
Physical security suffers from the same problem as network segmentation: everyone knows it is important, but the budget always goes to something else. To a new SIEM platform. To a next-generation firewall. To an AI-powered threat detection engine that was demonstrated on the trade show floor with an impressive dashboard. Meanwhile the door of the server room is ajar because the lock is broken, and it has been that way since March.
There is a universal law in information security that I call the Law of the Weakest Point: the security of a system is exactly as strong as the weakest link. And that weakest link is almost never technical. It is the USB stick in the parking lot. The employee who holds the door open. The WEP network in the parking garage. The post-it with the password on the monitor. It is the physical world undermining the digital one.
Every euro you spend on a firewall without locking the server room is a euro you might as well have put through the shredder. Although -- if you at least have that shredder, you are already ahead of most organizations.
Summary
Wireless and physical security form the often forgotten foundations beneath every digital defense. WPA3-Enterprise with 802.1X/RADIUS is the standard for business wireless networks; anything below that is an invitation. Guest networks must be completely isolated on a separate VLAN. Rogue access point detection via WIPS or periodic scans with Kismet prevents unauthorized devices from infiltrating your network. Network Access Control via 802.1X on wired ports determines who may be on your network. IoT and Bluetooth devices belong in a segmented network with strict outbound filtering. USB mass storage must be blocked via Group Policy or udev rules. Physical access control -- badge systems, mantraps, server room security -- forms the last line of defense that no software can replace. Clean desk policy, secure printing and cross-cut shredders prevent the lowest-barrier forms of information theft. The lesson from TJX is simple: it does not matter how good your digital security is if someone can walk into your network from the parking garage.
Further reading in the knowledge base
These articles in the portal give you more background and practical context:
- Firewalls -- the bouncer that does not stop everything
- Network segmentation -- why you should not connect everything to everything
- DNS -- the phone book that holds the internet together
- Logging and monitoring -- the security cameras of your IT environment
- Zero Trust -- trust nobody, not even yourself
You need an account to access the knowledge base. Log in or register.
Related security measures
These articles provide additional context and depth: