Navigate
AC-18
AC-18: Wireless Access
The organization:
- AC-18a.: Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
- AC-18b.: Authorizes wireless access to the information system prior to allowing such connections.
Supplemental
Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication.
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | unknown |
Overlays |
---|
Classified, Int-A, Int-B, Int-C |
Related Controls
The controls below (if any) were marked by NIST as being related to AC-18.
Enhancements
The controls below (if any) add on to the requirements of AC-18.
Related CCIs
The CCIs below are tied to AC-18.