SC-40 Wireless Link Protection

System and Communications Protection

Description

Protect external and internal [Assignment: organization-defined parameters] from the following signal parameter attacks: [Assignment: organization-defined parameters].

Supplemental Guidance

Wireless link protection applies to internal and external wireless communication links that may be visible to individuals who are not authorized system users. Adversaries can exploit the signal parameters of wireless links if such links are not adequately protected. There are many ways to exploit the signal parameters of wireless links to gain intelligence, deny service, or spoof system users. Protection of wireless links reduces the impact of attacks that are unique to wireless systems. If organizations rely on commercial service providers for transmission services as commodity items rather than as fully dedicated services, it may not be possible to implement wireless link protections to the extent necessary to meet organizational security requirements.

Changes from Rev 4

No significant title changes from Rev 4.

MITRE ATT&CK Techniques (1)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Credential Access 1 Collection 1

Credential Access

Compliance Mappings

NIS2 Directive

Art. 21(2)(h)

MAS TRM

10

ANSSI

Hygiene.25SecNumCloud.14.3

FINMA Circular 2023/1

IV.C(63)

RBI CSF

Annex1.4

FISC Security Guidelines

FISC.T10FISC.T4

HKMA TM-E-1

TME1.8.5

SAMA CSF

3.33.4

CBB TM

TM-8

Qatar NIA

CS

CBUAE

CR-8

CBE CSF

CTO-3

SA JS2

JS2-8.3

BoG CISD

CISD-VI

BoM CTRM

3.4

BOT Cyber Resilience

Ch2.4Ch2.7

PCI PTS v6

J