3.1.17 Protect wireless access using authentication and encryption.

Organizations authenticate individuals and devices to help protect wireless access to the system. Special attention is given to the wide variety of devices that are part of the Internet of Things with potential wireless access to organizational systems. See [NIST CRYPTO].

Actionable Items: Ensure that encryption over wireless is enabled and enforced. Use the highest level standard you can for your company.