AC-18: Wireless Access
Control Family:
CSF v1.1 References:
PF v1.0 References:
Threats Addressed:
Previous Version:
- NIST Special Publication 800-53 Revision 4:
- AC-18: Wireless Access
Control Statement
- Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and
- Authorize each type of wireless access to the system prior to allowing such connections.
Supplemental Guidance
Wireless technologies include microwave, packet radio (ultra-high frequency or very high frequency), 802.11x, and Bluetooth. Wireless networks use authentication protocols that provide authenticator protection and mutual authentication.
Control Enhancements
AC-18(1): Authentication and Encryption
Baseline(s):
- Moderate
- High
Protect wireless access to the system using authentication of [Assignment (one or more): users, devices] and encryption.
AC-18(3): Disable Wireless Networking
Baseline(s):
- Moderate
- High
Disable, when not intended for use, wireless networking capabilities embedded within system components prior to issuance and deployment.
AC-18(4): Restrict Configurations by Users
Baseline(s):
- High
Identify and explicitly authorize users allowed to independently configure wireless networking capabilities.
AC-18(5): Antennas and Transmission Power Levels
Baseline(s):
- High
Select radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.