[Withdrawn: Incorporated into AC-2k.]
[Withdrawn: Incorporated into AC-6.]
Provide the capability to disconnect or disable remote access to the system within [Assignment: organization-defined time period].
Implement [Assignment: organization-defined mechanisms] to authenticate [Assignment: organization-defined remote commands].
a. Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and b. Authorize each type of wireless access to the system prior to allowing such connections.
Protect wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.
[Withdrawn: Incorporated into MP-4 and SC-28.]
Disable, when not intended for use, wireless networking capabilities embedded within system components prior to issuance and deployment.
Identify and explicitly authorize users allowed to independently configure wireless networking capabilities.
Select radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.