Under active development Content is continuously updated and improved

AC-18(01)Wireless Access | Authentication and Encryption

Moderate

>Control Description

Protect wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.

>Discussion

Wireless networking capabilities represent a significant potential vulnerability that can be exploited by adversaries. To protect systems with wireless access points, strong authentication of users and devices along with strong encryption can reduce susceptibility to threats by adversaries involving wireless technologies.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.