Overview:
The information system protects wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.
Related Controls:>/b> SC-8, SC-13.
Action Items:
1) Ensure encryption requirements exists for wireless connectivity
2) Ensure all wireless access is authorized
Related Documents:
1) Access Control Policy
2) Network Security Policy
3) Wireless Security Policy
Additional Guidance:
Moderate FedRAMP-Defined Assignment / Selection Parameters
none
Moderate Additional FedRAMP Requirements and Guidance
none
Article ID: 44
Created: September 25, 2022
Last Updated: September 26, 2022
Author: Matthew Burdick
Online URL: http://www.compliancewiki.org/article/fedramp-authentication-and-encryption-ac-18-1-44.html