CMMC Practice AC.L2-3.1.17

Wireless Access Protection: Protect wireless access using authentication and encryption.

Monarch ISC Guidance

You can secure access to your wireless network using any of the methods described above, but you must do it. FIPS approved modules are mandatory when your wireless network is used to access CUI from internal devices.

Discussion From Source

NIST SP 800-171 R2 Organizations authenticate individuals and devices to help protect wireless access to the system. Special attention is given to the wide variety of devices that are part of the Internet of Things with potential wireless access to organizational systems.

References