Navigate
AC-18
AC-18: Wireless Access
The organization:
- a: Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
- b: Authorizes wireless access to the information system prior to allowing such connections.
Supplemental
Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication.
CIA Levels | |
---|---|
Confidentiality | high |
Integrity | high |
Availability | unknown |
Overlays |
---|
Classified, Int-A, Int-B, Int-C |
CSF Categories |
---|
PR.PT-4 |
Related Controls
The controls below (if any) were marked by NIST as being related to AC-18.
Enhancements
The controls below (if any) add on to the requirements of AC-18.
Related CCIs
The CCIs below are tied to AC-18.