AC-18 WIRELESS ACCESS

Page last updated:

PCF Compliance

Compliance with this requirement is the responsibility of the deployer. A PCF installation leverages network resources provided by the IaaS layer, therefore compliance with this requirement is inherited based upon the deployer’s choice of network technologies.


Control Description

The organization:

  1. Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
  2. Authorizes wireless access to the information system prior to allowing such connections.

Supplemental Guidance

Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication.