AC-18—Wireless Access
Low
Moderate
>Control Description
a
Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and
b
Authorize each type of wireless access to the system prior to allowing such connections.
>Discussion
Wireless technologies include microwave, packet radio (ultra-high frequency or very high frequency), 802.11x, and Bluetooth. Wireless networks use authentication protocols that provide authenticator protection and mutual authentication.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.