Under active development Content is continuously updated and improved

AC-18(4)Wireless Access

PBMM (P2)
Secret (P2)
Technical

>Control Description

WIRELESS ACCESS | RESTRICT CONFIGURATIONS BY USERS The organization identifies and explicitly authorizes users allowed to independently configure wireless networking capabilities.

>Supplemental Guidance

Organizational authorizations to allow selected users to configure wireless networking capability are enforced in part, by the access enforcement mechanisms employed within organizational information systems. Related controls: AC-3, SC-15.

Ask AI

Configure your API key to use AI features.