CMMC Practice AC5024; Requirements and Documentation | ChatFortress

Posted on June 19, 2021 by Benjamin Bressington

CMMC Practice AC5024; Requirements and Documentation | ChatFortress
Back to Full CMMC & NIST800-171 Requirements List

CMMC Practice Requirement:

Access Control - AC.5.024

Identify and mitigate risk associated with unidentified wireless access points connected to the network.

Access Control - AC.5.024 Clarification Statement

This practice can be implemented in a variety of ways. One approach would be to use a Wireless Intrusion Detection System (WIDS), a network device that monitors the radio spectrum for the presence of unauthorized access points. Other approaches are those used to detect and/or block any rogue network device. On the physical security side, unused RJ45 jacks in a facility can be turned off, however, this does not account for repurposing an authorized jack. A more robust solution is to identify authorized devices and create access controls limiting connections to those devices. Each device that is allowed to connect has a profile to include expected physical location that is maintained by the system administrators. This, in turn, facilitates the creation of a device white list which can be used with a port monitoring tool to control connections. Another approach would be the utilization of device detection software that the system administrator uses to establish a device baseline which is periodically compared to new scans using the same software to identify changes, specifically unauthorized additions when compared to the scan result of authorized connected devices.

Got CMMC and NIST800-171 Questions?

Let us help you get your CMMC and NIST800-171 questions answer by our security experts. Schedule a time to speak with one of our team members here.

Need more help understanding this CMMC & NIST800-171 requirement?

ChatFortress has made available a series of tools to help you implement CMMC & NIST800-171 into your company. Here are some of the resources you might want to review.

How to Implement a CMMC Audit/Assessment using CMMC Software Tool?

How can ChatFortress help you implement CMMC?


Are you worried that your company is vulnerable to ransomware?

The Business Cybersecurity System protects you against real-world threats while building your cybersecurity culture. Using the latest in breach and attack simulation our team can show you which ransomware and malware attacks would cripple your company regardless of the cybersecurity protections you already have in place!

Implement CMMC Faster and Easier?

Learn More

Who is ChatFortress

ChatFortress is a leading cybersecurity company that helps small and medium-size companies protect themselves from hacking attempts. Using Cybersecurity AI, Gamified cybersecurity awareness programs and providing virtual security analysts. Our goal is to help you create a cybersecurity aware culture.

Cybersecurity Resources

Talk to Us

Reduce your cybersecurity risk and exposure. Schedule time with your ChatFortress Specialist now
or Call 307-999-7755

Cybersecurity Education Links

Common Cybersecurity Mistakes and how you can protect yourself and your business from liability and financial loss! Instant Webinar Access!

Schedule Your Free Cybersecurity Risk Assessment Click Here to Schedule Call

Discover current hacker trends to steal your data and how you can protect yourself in 7 day FREE Email Cybersecurity crash course

Here are the 8 common types of email phishing attacks that hackers use to steal your identity. Are you protected?

Protect your business from hackersCrash Coursesmall business cybersecurity protectionHackerssmall business cybersecurity protection8typesofemailphishingscamssmall business cybersecurity protectionCMMC Compliance Check ListCybersecurity For Business