Mapped to NIST 800-171 Requirement: 3.1.13
CMMC Assessment Objective: AC.L2-3.1.13[a]
What This Objective Means
Wireless networks are convenient—but they also create risk. This objective ensures you have a complete inventory of all wireless access points that may interact with your systems.
You must be able to identify:
• Official company wireless networks (SSID, MAC address, physical location)
• Guest Wi-Fi access points
• Rogue or unauthorized devices broadcasting near or within your environment
The goal is to create visibility into your wireless surface area—so you can control it.
Why It Matters
If you don’t know which access points are active:
• Unauthorized users may connect to your network unnoticed
• Rogue access points could serve as backdoors to internal systems
• You may be unable to detect vulnerabilities in unmanaged WAPs
This control helps prevent wireless-based attacks and data leakage.
How to Implement It
• Conduct a wireless survey using scanning tools to detect:
◦ SSIDs
◦ Signal strength and location
◦ Encryption status
◦ MAC addresses
• Document all authorized WAPs and their configurations
• Maintain a list of wireless devices and keep it updated
• Use wireless intrusion detection/prevention systems (WIDS/WIPS) if feasible
• Investigate any unknown or unauthorized WAPs detected
Evidence the Assessor Will Look For
• Inventory of all wireless access points, including device ID, location, and configuration
• Screenshots or scan results from wireless monitoring tools
• Documentation that identifies and distinguishes between approved and unauthorized access points
• Policies or procedures that define how WAPs are deployed and tracked
Common Gaps
• No centralized inventory of wireless access points
• Wireless routers deployed by staff or contractors without approval
• No ongoing scanning or review to detect rogue or misconfigured WAPs
How Cuick Trac Helps
Cuick Trac supports this control by:
• Minimizing reliance on wireless access by keeping CUI in a centralized, wired enclave
• Helping document approved access methods and device inventories
• Supporting wireless access governance as part of your physical and technical security documentation
• Providing advisory support for identifying, reviewing, and documenting WAPs
With Cuick Trac, wireless access becomes a manageable exception—not a compliance blind spot.
Final CTA
You can’t secure what you can’t see.
Schedule a Cuick Trac demo and get full visibility into your wireless footprint—before it becomes a vulnerability.