AC-18 WIRELESS ACCESS
Page last updated:
PCF Compliance
Compliance with this requirement is the responsibility of the deployer. A PCF installation leverages network resources provided by the IaaS layer, therefore compliance with this requirement is inherited based upon the deployer’s choice of network technologies.
Control Description
The organization:
- Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
- Authorizes wireless access to the information system prior to allowing such connections.
Supplemental Guidance
Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication.