AC-18(4)—Wireless Access
PBMM (P2)
Secret (P2)
Technical
>Control Description
WIRELESS ACCESS | RESTRICT CONFIGURATIONS BY USERS The organization identifies and explicitly authorizes users allowed to independently configure wireless networking capabilities.
>Supplemental Guidance
Organizational authorizations to allow selected users to configure wireless networking capability are enforced in part, by the access enforcement mechanisms employed within organizational information systems. Related controls: AC-3, SC-15.
Ask AI
Configure your API key to use AI features.