AC-18—Wireless Access
PBMM (P1)
Secret (P1)
Technical
>Control Description
(A) The organization establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access. (B) The organization authorizes wireless access to the information system prior to allowing such connections.
>Supplemental Guidance
Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11, and Bluetooth. Wireless networks use authentication protocols (e.g., Extensible Authentication Protocol (EAP) / Transport Layer Security (TLS), Protected EAP (PEAP)), which provide credential protection and mutual authentication. Related controls: AC-2, AC-3, AC-17, AC-19, CA-3, CA-7, CM-8, IA-2, IA-3, IA-8, PL-4, SI-4, SC-9
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.
Ask AI
Configure your API key to use AI features.