Access Control (AC)

Level N/A

a. Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and b. Authorize each type of wireless access to the system prior to allowing such connections.


Login

Access Control (AC)

Protect wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.


Login

Access Control (AC)

[Withdrawn: Incorporated into MP-4 and SC-28.]


Login

Access Control (AC)

Disable, when not intended for use, wireless networking capabilities embedded within system components prior to issuance and deployment.


Login

Access Control (AC)

Identify and explicitly authorize users allowed to independently configure wireless networking capabilities.


Login

Access Control (AC)

Select radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.


Login

Access Control (AC)

a. Establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices, to include when such devices are outside of controlled areas; and b. Authorize the connection of mobile devices to organizational systems.


Login

Access Control (AC)

[Withdrawn: Incorporated into AC-4.]


Login

Access Control (AC)

[Withdrawn: Incorporated into AC-16.]


Login

Access Control (AC)

[Withdrawn: Incorporated into AC-7.]


Login