CRY-07
Wireless Access Authentication & Encryption
Description
Mechanisms exist to protect the confidentiality and integrity of wireless networking technologies by implementing authentication and strong encryption.
Control Question
Does the organization protect the confidentiality and integrity of wireless networking technologies by implementing authentication and strong encryption?
Control Metadata
Domain:
Cryptographic Protections
Validation Cadence:
Annual
