Mechanisms exist to protect the confidentiality and integrity of wireless networking technologies by implementing authentication and strong encryption.
Control Question
Assessment question for control validation
Does the organization protect the confidentiality and integrity of wireless networking technologies by implementing authentication and strong encryption?
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 1 - Strategic
Tier 2 - Operational
Tier 3 - Tactical
Core Control Designations
Special designations and baseline inclusions
ESP Level 1: CRY-07
ESP Level 2: CRY-07
ESP Level 3: CRY-07