AC-18(4)
AC-18(4): Restrict Configurations by Users
Identify and explicitly authorize users allowed to independently configure wireless networking capabilities.
Supplemental
Organizational authorizations to allow selected users to configure wireless networking capabilities are enforced, in part, by the access enforcement mechanisms employed within organizational systems.
| CIA Levels | |
|---|---|
| Confidentiality | low |
| Integrity | low |
| Availability | unknown |
| Overlays |
|---|
| Classified, DAF Baseline, Int-A, Int-B, Int-C |
| CSF Categories |
|---|
| None |