Under active development Content is continuously updated and improved

AC-18(5)Wireless Access | Antennas and Transmission Power Levels

IL4 High
IL5
IL6

>Control Description

Select radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Actions that may be taken to limit unauthorized use of wireless communications outside of organization-controlled boundaries include reducing the power of wireless transmissions so that the transmissions are less likely to emit a signal that can be captured outside of the physical perimeters of the organization, employing measures such as emissions security to control wireless emanations, and using directional or beamforming antennas that reduce the likelihood that unintended receivers will be able to intercept signals. Prior to taking such mitigating actions, organizations can conduct periodic wireless surveys to understand the radio frequency profile of organizational systems as well as other systems that may be operating in the area.

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of AC-18(5) (Antennas And Transmission Power Levels)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring AC-18(5)?
  • How frequently is the AC-18(5) policy reviewed and updated, and what triggers policy changes?
  • What training or awareness programs ensure personnel understand their responsibilities related to AC-18(5)?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce AC-18(5) requirements.
  • What automated tools, systems, or technologies are deployed to implement AC-18(5)?
  • How is AC-18(5) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce AC-18(5) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of AC-18(5)?
  • What audit logs, records, reports, or monitoring data validate AC-18(5) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of AC-18(5) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate AC-18(5) compliance?

Ask AI

Configure your API key to use AI features.