AC-18: Wireless Access
From NIST's SP800-53:
a. Establish configuration requirements, connection requirements, and implementation guidance for each type of wireless access; and b. Authorize each type of wireless access to the system prior to allowing such connections.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
SP800-53 Control Mapped to NIST Cyber Security Framework
Generated from NISTs SP800-53/CSF Crosswalk mappings.
Control ID | Description |
---|---|
PR.PT-4 | Communications and control networks are protected |
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1565.002 | Transmitted Data Manipulation | Impact |
T1119 | Automated Collection | Collection |
T1552.004 | Private Keys | Credential Access |
T1602.001 | SNMP (MIB Dump) | Collection |
T1040 | Network Sniffing | Credential Access, Discovery |
T1070.002 | Clear Linux or Mac System Logs | Defense Evasion |
T1565.001 | Stored Data Manipulation | Impact |
T1011.001 | Exfiltration Over Bluetooth | Exfiltration |
T1070.001 | Clear Windows Event Logs | Defense Evasion |
T1558.004 | AS-REP Roasting | Credential Access |
T1530 | Data from Cloud Storage | Collection |
T1558 | Steal or Forge Kerberos Tickets | Credential Access |
T1557.002 | ARP Cache Poisoning | Collection, Credential Access |
T1557 | Adversary-in-the-Middle | Collection, Credential Access |
T1602.002 | Network Device Configuration Dump | Collection |
T1070.008 | Clear Mailbox Data | Defense Evasion |
T1565 | Data Manipulation | Impact |
T1020.001 | Traffic Duplication | Exfiltration |
T1558.003 | Kerberoasting | Credential Access |
T1558.002 | Silver Ticket | Credential Access |
T1070 | Indicator Removal | Defense Evasion |
T1602 | Data from Configuration Repository | Collection |
T1011 | Exfiltration Over Other Network Medium | Exfiltration |
T1552 | Unsecured Credentials | Credential Access |