AC.L2-3.1.13[b]: Require Authorization for Wireless Access in Policy and Practice

Mapped to NIST 800-171 Requirement: 3.1.13
CMMC Assessment Objective: AC.L2-3.1.13[b]

What This Objective Means
This control builds on AC.L2-3.1.13[a] by focusing on the governance side of wireless access. The expectation is that:
• Wireless access to your network is not allowed by default
• Access is granted only through documented approval processes
• Your access control policy explicitly states that wireless access must be authorized
It’s about making sure wireless connectivity is treated with the same level of scrutiny as wired or remote access.

Why It Matters
If wireless access is unregulated:
• Anyone within range could attempt to connect to your network
• Sensitive data could be intercepted over insecure channels
• Unauthorized or rogue access points may go unnoticed
Requiring authorization ensures wireless access points are known, reviewed, and controlled.

How to Implement It
• Update your access control policy to include language such as:
◦ “Wireless access to organizational systems must be explicitly authorized.”
◦ “Unauthorized wireless access points are prohibited.”
• Define what constitutes authorized wireless access (e.g., encryption standards, MAC filtering, VLAN segmentation)
• Include wireless authorization in procedures for onboarding users, devices, or network changes
• Maintain records of who approved each wireless access point and who has access

Evidence the Assessor Will Look For
• A current access control policy that explicitly mentions wireless access authorization
• Procedures describing how wireless access is requested, reviewed, and granted
• Documentation showing approved wireless devices or access points
• Logs or records of authorized wireless connections or provisioning tickets

Common Gaps
• Policy doesn’t mention wireless access at all
• Staff or departments set up wireless access without formal review
• No centralized documentation or tracking of wireless access approvals

How Cuick Trac Helps
Cuick Trac supports this control by:
• Minimizing the use of wireless access in favor of controlled, wired enclave environments
• Helping develop and document wireless access policies aligned with CMMC requirements
• Supporting third-party wireless access policies where limited Wi-Fi is required (e.g., on-site vendors)
• Offering templates for documenting approval and deployment of authorized WAPs
With Cuick Trac, wireless access is managed like everything else—intentionally, securely, and by design.

Final CTA
Wireless is easy to set up—but it must be harder to approve.
Schedule a Cuick Trac demo and take full control of your wireless authorization process.

🍪 We Use Cookies

To enhance your experience and analyze site usage, we use cookies. By continuing to use our site, you agree to our use of cookies in accordance with our Privacy Policy.