NIST 800-53 REV 5 • ACCESS CONTROL
AC-18(3) — Disable Wireless Networking
Disable, when not intended for use, wireless networking capabilities embedded within system components prior to issuance and deployment.
CMMC Practice Mapping
NIST 800-171 Mapping
Related Controls
No related controls listed
Supplemental Guidance
Wireless networking capabilities that are embedded within system components represent a significant potential vulnerability that can be exploited by adversaries. Disabling wireless capabilities when not needed for essential organizational missions or functions can reduce susceptibility to threats by adversaries involving wireless technologies.
Practitioner Notes
In some environments, the right answer is to disable wireless entirely. If wireless is not needed for the mission, turning it off eliminates the risk completely.
Example 1: In environments processing classified data, physically disable WiFi and Bluetooth on all devices. In the BIOS, disable the wireless NIC. Via GPO, disable the Windows WiFi service: Computer Configuration → Windows Settings → Security Settings → System Services → WLAN AutoConfig → Disabled.
Example 2: Use Intune device configuration profiles to disable WiFi on devices that must only use wired connections. Under Device restrictions → General → Wi-Fi, set to Block. For additional assurance, use USB port blockers on wireless adapters and document the policy in your SSP.