a. Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and b. Authorize each type of wireless access to the system prior to allowing such connections.
a. Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and b. Authorize each type of wireless access to the system prior to allowing such connections.
Protect wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.
[Withdrawn: Incorporated into MP-4 and SC-28.]
Disable, when not intended for use, wireless networking capabilities embedded within system components prior to issuance and deployment.
Identify and explicitly authorize users allowed to independently configure wireless networking capabilities.
Select radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.
a. Establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices, to include when such devices are outside of controlled areas; and b. Authorize the connection of mobile devices to organizational systems.
[Withdrawn: Incorporated into AC-4.]
[Withdrawn: Incorporated into AC-16.]
[Withdrawn: Incorporated into AC-7.]