AC.L2-3.1.17 – Protect wireless access using authentication and encryption.
This control comes from NIST SP 800-171 REV.2 / CMMC 2.0 Level 2.
This control requires you to protect all wireless access to your systems using strong authentication and encryption. In practice, that means users must prove who they are before connecting (e.g., password, certificates, directory credentials) and all traffic over Wi‑Fi must be encrypted to prevent eavesdropping. Doing so prevents unauthorized people from joining your network, sniffing your wireless traffic, or reaching internal resources.
Define a wireless access policy that specifies approved encryption standards (e.g., WPA3/WPA2), authentication methods (pre-shared key vs. 802.1X Enterprise), network segmentation (corporate vs. guest), and key/credential management (creation, distribution, rotation, and revocation). Include onboarding/offboarding steps for users and devices, BYOD rules, device authorization for company-managed endpoints, and access reviews of who/what can connect. Document AP configuration standards, change control for SSIDs and keys, incident response for suspected rogue access points, and logging/monitoring procedures.
A 60-person professional services firm standardizes on WPA2-Enterprise using 802.1X. The IT team deploys a RADIUS server tied to Active Directory and configures EAP-TLS with user and device certificates distributed through their MDM. They create two SSIDs: “Company-Secure” mapped to the corporate VLAN and “Company-Guest” mapped to an internet-only VLAN with client isolation. Default AP credentials are changed, WPS is disabled, and firmware updates are scheduled quarterly. A wireless access procedure requires HR to trigger IT offboarding so user accounts are disabled and certificates revoked the same day. RADIUS and controller logs are forwarded to the SIEM, and alerts notify IT of repeated authentication failures or the appearance of rogue SSIDs. Quarterly, the network administrator reviews wireless access logs and the inventory of APs and connected devices to confirm only authorized endpoints are present.
Meeting AC.L2-3.1.17 means pairing clear rules with solid engineering: require strong authentication to join your Wi‑Fi and ensure all traffic is encrypted, segment corporate and guest access, harden your wireless infrastructure, rotate keys or revoke certificates as people and devices change, and continuously monitor connections. With a concise wireless policy, defined onboarding/offboarding steps, and the technical measures above, an SMB can prevent unauthorized access, block eavesdropping, and maintain trustworthy wireless connectivity.
Quick & Simple
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you
We typically reply within minutes