Under active development Content is continuously updated and improved

AC-18Wireless Access

PBMM (P1)
Secret (P1)
Technical

>Control Description

(A) The organization establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access. (B) The organization authorizes wireless access to the information system prior to allowing such connections.

>Supplemental Guidance

Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11, and Bluetooth. Wireless networks use authentication protocols (e.g., Extensible Authentication Protocol (EAP) / Transport Layer Security (TLS), Protected EAP (PEAP)), which provide credential protection and mutual authentication. Related controls: AC-2, AC-3, AC-17, AC-19, CA-3, CA-7, CM-8, IA-2, IA-3, IA-8, PL-4, SI-4, SC-9

>Tailoring Guidance

This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.

Ask AI

Configure your API key to use AI features.