AC-18: Wireless Access
CSF v1.1 References:
PF v1.0 References:
- NIST Special Publication 800-53 Revision 4:
- AC-18: Wireless Access
- Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and
- Authorize each type of wireless access to the system prior to allowing such connections.
Wireless technologies include microwave, packet radio (ultra-high frequency or very high frequency), 802.11x, and Bluetooth. Wireless networks use authentication protocols that provide authenticator protection and mutual authentication.
AC-18(1): Authentication and Encryption
Protect wireless access to the system using authentication of [Assignment (one or more): users, devices] and encryption.
AC-18(3): Disable Wireless Networking
Disable, when not intended for use, wireless networking capabilities embedded within system components prior to issuance and deployment.
AC-18(4): Restrict Configurations by Users
Identify and explicitly authorize users allowed to independently configure wireless networking capabilities.
AC-18(5): Antennas and Transmission Power Levels
Select radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.