AC-18(4)
AC-18(4): Restrict Configurations by Users
The organization identifies and explicitly authorizes users allowed to independently configure wireless networking capabilities.
Supplemental
Organizational authorizations to allow selected users to configure wireless networking capability are enforced in part, by the access enforcement mechanisms employed within organizational information systems.
CIA Levels | |
---|---|
Confidentiality | high |
Integrity | high |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |