Under active development Content is continuously updated and improved

NO-18Authentication: Wireless Access Points

>Control Description

Organization restricts access to network services via wireless access points to authenticated users and services; approved wireless encryption protocols are required for wireless connections.

Theme

Technology

Type

Preventive

Policy/Standard

Network Security Standard

>Implementation Guidance

1. Ensure that a process is defined and documented to restrict access to network services via wireless access points to authenticated users and services 2. Ensure Approved wireless encryption protocols are required for wireless connections.

>Testing Procedure

1. Inspect and validate that a process is defined and documented to restrict access to network services via wireless access points to authenticated users and services 2. Validate whether approved wireless encryption protocols are required for wireless connections.

>Audit Artifacts

E-NO-01
E-NO-22

>Framework Mappings

Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.

Ask AI

Configure your API key to use AI features.