Wireless Access Point Inventory
PCI DSS requires you to maintain an inventory of every authorized wireless access point, and to document a business justification for each one, so assessors can distinguish approved infrastructure from rogue devices during testing. Operationalize this by defining an inventory owner, standard data fields, an approval workflow, and evidence that the inventory is kept current. 1
Key takeaways:
- Maintain an authoritative list of approved wireless access points, not a best-effort spreadsheet. 1
- Capture a documented business justification per access point, tied to an owner and location. 1
- Keep artifacts that prove the inventory is operating: approvals, change records, and periodic reviews.
“Wireless access point inventory” under PCI DSS 4.0.1 is a requirement-level control: you must be able to show, on demand, which wireless access points are authorized in scope, and why each one exists from a business standpoint. The practical goal is simple: prevent rogue or unmanaged wireless devices from creating an unmonitored path into the cardholder data environment (CDE) or connected networks.
For a CCO or GRC lead, the fastest path is to treat this as a governed asset inventory problem with a narrow scope: wireless access points (APs) that are deployed in environments that store, process, or transmit payment card data, plus any wireless APs that could affect the security of the CDE. Your assessor will test whether the inventory is complete, current, and backed by business justification, and whether your operating teams actually use it in day-to-day work.
This page translates PCI DSS 4.0.1 Requirement 11.2.2 into an implementable workflow, including roles, step-by-step execution, required evidence, common audit hangups, and a practical execution plan you can run without rewriting your entire asset management program. 1
Regulatory text
Requirement (PCI DSS 4.0.1): “An inventory of authorized wireless access points is maintained, including a documented business justification.” 1
Operator interpretation (what you must do):
- Maintain an inventory that identifies all authorized wireless access points in the environment that matters for PCI DSS (CDE and connected/impacting networks). 1
- Document a business justification for each AP so there is a clear approval rationale and you can challenge “convenience” deployments. 1
- Operate it as a control, meaning you can show it’s kept current and used for governance, not created once for an audit.
Who it applies to
Entity scope
Applies to:
- Merchants that store, process, or transmit account data.
- Service providers whose people, processes, or systems can affect the security of the CDE.
- Payment processors operating card data environments. 1
Operational scope (what systems and teams are involved)
You will touch multiple functions:
- Network engineering / IT infrastructure (owns AP deployment standards and configs)
- Security operations (rogue AP detection, investigations)
- GRC / compliance (control design, evidence readiness)
- Facilities / site ops (physical locations, ceilings, closets, “shadow IT” realities)
- Third parties (MSPs, installers, co-managed network providers) when they deploy or manage APs that impact the CDE
Practical scoping rule: if an AP can provide network access into the CDE or a connected network that can affect the CDE, treat it as in scope for the inventory and justification.
Plain-English requirement interpretation
You need a “source of truth” list of approved wireless APs, with enough detail to:
- Identify the device (model/serial/MAC/asset tag)
- Find it (site, floor, closet/area)
- Assign responsibility (technical owner, business owner)
- Explain why it exists (business justification)
- Prove approval and ongoing governance (ticket/change record, review history)
Assessors commonly treat this as a completeness and governance test. If you cannot reliably tell an auditor which APs are authorized, you cannot convincingly detect rogue APs, and you cannot show control over wireless entry points. 1
What you actually need to do (step-by-step)
Step 1: Name an inventory owner and define the system of record
- Assign a single inventory owner (often Network Engineering) and a control owner (often Security/GRC) who ensures the evidence and review cadence exists.
- Choose the system of record:
- CMDB/asset inventory tool (preferred), or
- A controlled register with access control and change history (acceptable if governed)
Daydream note: if you use Daydream to manage control evidence, store the latest inventory export, approval artifacts, and review attestations in a single control record so audit retrieval is consistent.
Step 2: Define required inventory fields (minimum viable, audit-friendly)
Use a standard template. Recommended fields:
- Unique ID (asset tag or internal ID)
- Manufacturer / model
- Serial number (if available)
- MAC address(es) and/or radio identifiers
- Hostname
- Management IP and VLAN/SSID association
- Physical location (site, building, floor, room/area)
- Environment tag (CDE, connected-to-CDE, corporate, guest)
- Status (planned, active, retired)
- Technical owner (team and individual)
- Business owner (department)
- Business justification (short, specific statement)
- Approval reference (change ticket / request ID)
- Install date and last verified date
Keep the justification short but defensible. Example: “Warehouse handheld scanning requires Wi‑Fi coverage in aisle zones; AP supports inventory scanning app used for fulfillment operations.”
Step 3: Establish an authorization workflow (so “authorized” has meaning)
Define how an AP becomes authorized:
- Request (business need captured)
- Security/network review (architecture and segmentation implications)
- Approval (documented)
- Deployment
- Inventory update (same day as deployment is the operational target)
- Post-deploy validation (correct SSIDs, segmentation, logging/monitoring alignment)
- Periodic re-validation (see Step 5)
If a third party installs APs, contractually require them to:
- Use your request/approval process
- Provide required inventory data fields
- Deliver “as-built” documentation that maps to your register
Step 4: Reconcile the inventory against reality (completeness control)
Your inventory is only credible if you can show reconciliation. Common approaches:
- Controller-based export reconciliation (for centralized WLAN controllers)
- Network discovery scans focused on wireless infrastructure address ranges
- Physical verification for high-risk sites (data closets, POS areas)
The specific method can vary; what matters is that you can explain how you gain confidence that the inventory matches deployed APs and that discrepancies trigger investigation and remediation.
Step 5: Operationalize ongoing maintenance (keep it current)
Define “update triggers” that require inventory changes:
- New AP installed
- AP replaced (RMA)
- AP moved to a new location
- SSID/VLAN role change that affects CDE connectivity
- AP retired/decommissioned
Add a lightweight periodic review:
- Inventory owner reviews deltas and confirms accuracy
- Security/GRC reviews evidence and records an attestation
- Exceptions are tracked with due dates and owners
Your evidence should show the review happened and what changed.
Step 6: Prepare the audit package (so you can answer quickly)
Create a ready-to-hand “11.2.2 evidence set”:
- Current inventory export (dated)
- Sample of AP records showing business justification populated
- Approval artifacts (tickets/changes) tied to sampled APs
- Procedure documenting how inventory is maintained, including roles and review cadence
- Evidence of periodic review/reconciliation (attestation, findings log)
Required evidence and artifacts to retain
Keep artifacts that show both design and operation:
Design evidence
- Wireless AP inventory procedure (owner, scope statement, required fields, update triggers)
- RACI (who requests, approves, deploys, updates inventory, reviews)
- Standard template/data schema for AP records
Operating evidence
- Inventory register export with timestamp and version history
- Change tickets/requests that show authorization and tie to each AP (sample-based is typical in audits)
- Reconciliation outputs (controller exports, scan results, discrepancy tickets)
- Periodic review attestation and exception log
- Decommission records for retired APs
This aligns with the intent to publish procedures and retain operating artifacts showing the inventory is used in day-to-day work. 1
Common exam/audit questions and hangups
Expect questions like:
- “Show me your inventory of authorized wireless access points.” 1
- “How do you define ‘authorized’?” Who can approve?
- “Pick three APs from your controller. Show me where they are in the inventory, who owns them, and the business justification.”
- “How do you ensure the inventory stays current after adds/moves/changes?”
- “How do you handle APs managed by a third party or installed by facilities?”
- “Do you have a process to identify rogue APs, and how does the inventory support that investigation?”
Hangups that create findings:
- Inventory exists but has no business justification per AP. 1
- Justification is generic (“Wi‑Fi needed”) with no owner, location, or linkage to a request.
- Inventory is missing APs present in controller exports.
- No evidence of periodic review; it looks created for the assessment.
Frequent implementation mistakes (and how to avoid them)
-
Treating the inventory as a static spreadsheet.
Fix: move it into a controlled system with change history and defined ownership; store periodic exports as immutable evidence. -
No consistent “business justification” standard.
Fix: require a short justification plus business owner and approving authority; reject vague justifications. -
Ignoring third-party-installed APs.
Fix: require third parties to follow your approval workflow and deliver inventory fields as part of closeout. -
No reconciliation mechanism.
Fix: document at least one technical reconciliation method (controller export comparison is often easiest) and track discrepancies to closure. -
Poor location data.
Fix: standardize location granularity (site/building/floor/area) and make it mandatory at install time.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this specific requirement, so this page does not cite enforcement examples.
Operational risk is still real: unmanaged wireless APs create network entry points that bypass wired controls and can invalidate segmentation assumptions during PCI scoping. A weak inventory also slows incident response; you lose time identifying whether a detected AP is approved, where it sits, and who owns it. 1
Practical execution plan (30/60/90-day)
The plan below is structured for rapid operationalization. Treat the timelines as phases you can compress or extend based on your environment complexity.
First 30 days (baseline and governance)
- Assign inventory owner and control owner; publish responsibility and approval authorities.
- Select system of record and lock required data fields (including business justification).
- Pull initial AP population from WLAN controllers, procurement records, and network team lists.
- Triage gaps: missing owners, unknown locations, missing justifications.
- Draft and approve the written procedure for maintaining the inventory. 1
Days 31–60 (reconciliation and workflow)
- Implement the authorization workflow in your ticketing/change system.
- Reconcile inventory against controller exports; open discrepancy tickets.
- For each AP, populate business justification and approval reference; escalate any “no justification” APs to a remediation decision (justify, retire, or isolate).
- Define periodic review steps and evidence format (attestation + exceptions log). 1
Days 61–90 (steady-state evidence and audit readiness)
- Run at least one full review cycle: export inventory, reconcile, document findings, close issues.
- Sample-test: pick APs at random and confirm record completeness (location, owner, justification, approval).
- Validate third-party process: ensure contracts/SOWs require inventory updates and closeout artifacts.
- Package the “11.2.2 evidence set” in your GRC repository (Daydream or your equivalent) so you can produce it quickly for your QSA/ISA. 1
Frequently Asked Questions
Do I need to inventory guest Wi‑Fi access points too?
If the guest APs can affect the security of the CDE (for example, shared infrastructure, weak segmentation assumptions, or shared management), include them. If they are truly isolated, document that scoping decision and keep the inventory aligned to your defined scope. 1
What counts as a “documented business justification” for an AP?
A short statement tied to a business function, with a named business owner and an approval reference, is typically defensible. Avoid generic entries like “Wi‑Fi required” without context or accountability. 1
Can a controller export serve as the inventory?
It can be a strong input, but assessors usually expect an “authorized inventory” with governance fields that controller exports often lack (business owner, justification, approval record). Many teams store controller exports as reconciliation evidence and keep the governed inventory in a CMDB/GRC-controlled register. 1
How do we handle AP replacements (RMAs) without breaking the audit trail?
Treat replacements as a change event: update the record with the new serial/MAC, keep the approval/change ticket, and retain the prior values in history or an attachment. The audit goal is traceability, not perfection in a single row. 1
We have multiple sites and local IT sometimes installs APs. What’s the simplest control to stop “shadow APs”?
Make AP installation require an approved change ticket and require procurement to block purchases outside the approved catalog. Pair that with periodic reconciliation against controller exports so unauthorized devices show up quickly. 1
What evidence does a QSA commonly request for 11.2.2?
A dated inventory export, proof that each sampled AP has a business justification, and evidence the inventory is maintained (procedure, approvals, and a review/reconciliation record). Keep these packaged in one place to reduce back-and-forth during fieldwork. 1
What you actually need to do
Use the cited implementation guidance when translating the requirement into day-to-day operating steps. 2
Footnotes
Frequently Asked Questions
Do I need to inventory guest Wi‑Fi access points too?
If the guest APs can affect the security of the CDE (for example, shared infrastructure, weak segmentation assumptions, or shared management), include them. If they are truly isolated, document that scoping decision and keep the inventory aligned to your defined scope. (Source: PCI DSS v4.0.1 Requirement 11.2.2)
What counts as a “documented business justification” for an AP?
A short statement tied to a business function, with a named business owner and an approval reference, is typically defensible. Avoid generic entries like “Wi‑Fi required” without context or accountability. (Source: PCI DSS v4.0.1 Requirement 11.2.2)
Can a controller export serve as the inventory?
It can be a strong input, but assessors usually expect an “authorized inventory” with governance fields that controller exports often lack (business owner, justification, approval record). Many teams store controller exports as reconciliation evidence and keep the governed inventory in a CMDB/GRC-controlled register. (Source: PCI DSS v4.0.1 Requirement 11.2.2)
How do we handle AP replacements (RMAs) without breaking the audit trail?
Treat replacements as a change event: update the record with the new serial/MAC, keep the approval/change ticket, and retain the prior values in history or an attachment. The audit goal is traceability, not perfection in a single row. (Source: PCI DSS v4.0.1 Requirement 11.2.2)
We have multiple sites and local IT sometimes installs APs. What’s the simplest control to stop “shadow APs”?
Make AP installation require an approved change ticket and require procurement to block purchases outside the approved catalog. Pair that with periodic reconciliation against controller exports so unauthorized devices show up quickly. (Source: PCI DSS v4.0.1 Requirement 11.2.2)
What evidence does a QSA commonly request for 11.2.2?
A dated inventory export, proof that each sampled AP has a business justification, and evidence the inventory is maintained (procedure, approvals, and a review/reconciliation record). Keep these packaged in one place to reduce back-and-forth during fieldwork. (Source: PCI DSS v4.0.1 Requirement 11.2.2)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream