Skip to content

3.1.17 — Lock Down the Wi-Fi

Protect wireless access using authentication and encryption.

Two protections working together:

Authentication — every user proves their identity before connecting. Options from weakest to strongest:

  • WPA2-PSK (shared password) — acceptable for small teams but change it when anyone leaves
  • WPA2-Enterprise with RADIUS — each user authenticates individually. Preferred.
  • WPA3 — strongest option where supported

Encryption — all wireless traffic is encrypted. If your wireless network carries CUI traffic, the encryption must be FIPS 140 validated (not just using an approved algorithm — the actual module must be validated).


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Is wireless access protected by authentication?Users prove identity before connecting
2Is wireless access protected by encryption?All wireless traffic is encrypted

Documents they’ll review: Access control policy, wireless implementation procedures, system security plan, system config, audit logs

People they’ll talk to: Sysadmins, information security staff, system developers

Live demos they’ll ask for: “Show me the wireless authentication method. Show me the encryption configuration.”


These are the actual questions. Have answers ready.

  • “Is wireless access limited to authenticated and authorized users?”
  • “If using PSK, is access to the key restricted to authorized users only?”
  • “Is wireless encryption FIPS-validated? Show me the validation — the module, not just the algorithm.”

Shared password that never rotates. WPA2-PSK password known by current and former employees. If you use PSK, change it on every departure.

Right algorithm, unvalidated module. Using AES but the access point firmware isn’t FIPS 140 validated.

Guest and corporate on same SSID. No separation between guest wireless and CUI-carrying traffic.



RequirementWhy it matters here
3.1.16 — Wi-Fi Approval FirstAuthorization before this control protects
3.13.11 — FIPS or It Doesn’t CountFIPS validation requirement for encryption

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: AC.L2-3.1.17 | SPRS Weight: 5 points | POA&M Eligible: No