AC-18 WIRELESS ACCESS
Page last updated:
Compliance with this requirement is the responsibility of the deployer. A PCF installation leverages network resources provided by the IaaS layer, therefore compliance with this requirement is inherited based upon the deployer’s choice of network technologies.
- Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
- Authorizes wireless access to the information system prior to allowing such connections.
Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication.