15.8: Use Wireless Authentication Protocols That Require Mutual, Multi-Factor Authentication
CSF v1.1 References:
Threats Addressed:
Group:
The next version of the control set incorporates all or part of this control into: 12.6: Use of Secure Network Management and Communication Protocols.
Control Statement
Ensure that wireless networks use authentication protocols such as Extensible Authentication Protocol-Transport Layer Security (EAP/TLS), which requires mutual, multi-factor authentication.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]