3.1.17

  • Requirement

    Protect wireless access using authentication and encryption

  • Discussion

    Organizations authenticate individuals and devices to help protect wireless access to the system. Special attention is given to the wide variety of devices that are part of the Internet of Things with potential wireless access to organizational systems. See [NIST CRYPTO].

More Info

  • Family

    Access Control
  • DoD Scoring Methodology Points

    5
  • Related CMMC ID

  • Related NIST 800-53 ID

    AC-18(1)
  • Reference Documents

    • N/A

NIST 800-171A Assessment Guidance

CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!