- Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and
- Authorize each type of wireless access to the system prior to allowing such connections.
Wireless technologies include microwave, packet radio (ultra-high frequency or very high frequency), 802.11x, and Bluetooth. Wireless networks use authentication protocols that provide authenticator protection and mutual authentication.
Protect wireless access to the system using authentication of [Assignment (one or more): users, devices] and encryption.
Disable, when not intended for use, wireless networking capabilities embedded within system components prior to issuance and deployment.
Identify and explicitly authorize users allowed to independently configure wireless networking capabilities.
Select radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.