CMMC 2.0 • LEVEL 2 • ACCESS CONTROL
AC.L2-3.1.16 — Wireless Access
Establish usage restrictions, configuration requirements, and connection requirements for each type of wireless access to the system. Authorize each type of wireless access to the system prior to establishing such connections. Disable, when not intended for use, wireless networking capabilities prior to issuance and deployment. Protect wireless access to the system using authentication and encryption.
Assessment Objectives
- each type of wireless access to the system is defined.
- usage restrictions are established for each type of wireless access to the system.
- configuration requirements are established for each type of wireless access to the system.
- connection requirements are established for each type of wireless access to the system.
- each type of wireless access to the system is authorized prior to establishing such connections.
- wireless networking capabilities not intended for use are disabled prior to issuance and deployment.
- wireless access to the system is protected using authentication.
- wireless access to the system is protected using encryption.
Practitioner Notes
Practitioner commentary coming soon.