- AC-18a.: Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
- AC-18b.: Authorizes wireless access to the information system prior to allowing such connections.
Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication.
|Classified, Int-A, Int-B, Int-C|
The controls below (if any) were marked by NIST as being related to AC-18.
The controls below (if any) add on to the requirements of AC-18.
The CCIs below are tied to AC-18.