3.1.16 Authorize wireless access prior to allowing such connections.

Establishing usage restrictions and configuration/connection requirements for wireless access to the system provides criteria for organizations to support wireless access authorization decisions. Such restrictions and requirements reduce the susceptibility to unauthorized access to the system through wireless technologies. Wireless networks use authentication protocols which provide credential protection and mutual authentication.

[SP 800-97] provide guidance on secure wireless networks.

Actionable Items:    Establish usage restrictions on wireless devices based on requirements of the attached device.  Limit access to known devices.