AC-18(1)—Authentication And Encryption
MODERATE
HIGH
>Control Description
Protect wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.
>Supplemental Guidance
Wireless networking capabilities represent a significant potential vulnerability that can be exploited by adversaries. To protect systems with wireless access points, strong authentication of users and devices along with strong encryption can reduce susceptibility to threats by adversaries involving wireless technologies.