NO-18—Authentication: Wireless Access Points
>Control Description
Organization restricts access to network services via wireless access points to authenticated users and services; approved wireless encryption protocols are required for wireless connections.
Theme
Technology
Type
Preventive
Policy/Standard
Network Security Standard>Implementation Guidance
1. Ensure that a process is defined and documented to restrict access to network services via wireless access points to authenticated users and services 2. Ensure Approved wireless encryption protocols are required for wireless connections.
>Testing Procedure
1. Inspect and validate that a process is defined and documented to restrict access to network services via wireless access points to authenticated users and services 2. Validate whether approved wireless encryption protocols are required for wireless connections.
>Audit Artifacts
E-NO-01
E-NO-22
>Framework Mappings
Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.
Ask AI
Configure your API key to use AI features.