graphgrc

NIST 800-53v5 - AC-18.1 - Authentication and Encryption

Guidance

Wireless networking capabilities represent a significant potential vulnerability that can be exploited by adversaries. To protect systems with wireless access points, strong authentication of users and devices along with strong encryption can reduce susceptibility to threats by adversaries involving wireless technologies.

Mapped SCF controls