AC-18(1)
AC-18(1): Authentication and Encryption
Protect wireless access to the system using authentication of [one or more of "users"/"devices"] and encryption.
Supplemental
Wireless networking capabilities represent a significant potential vulnerability that can be exploited by adversaries. To protect systems with wireless access points, strong authentication of users and devices along with strong encryption can reduce susceptibility to threats by adversaries involving wireless technologies.
| CIA Levels | |
|---|---|
| Confidentiality | low |
| Integrity | low |
| Availability | unknown |
| Overlays |
|---|
| CMMC, Privacy (accountability), Privacy (high), Privacy (low), Privacy (moderate) |
| CSF Categories |
|---|
| None |