https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/116057-site-survey-guidelines-wlan-00.html
The intended purpose of this document is to provide guidelines for proper planning, preparation, and identification of the key items to check through the analysis of a survey report.
https://www.cisco.com/c/en/us/products/wireless/what-is-wi-fi-security.html
This webpage provides the reader a basic understanding of the various wireless encryption types.
Cox Blue – 10 Ways To Secure Your Business WiFi Network
3.1 3.1.16 3.1.17 Access Control
https://www.coxblue.com/10-steps-to-take-right-now-to-secure-your-business-wifi-network/
Follow these 10 steps today to make your network and business information safer.
National Security Agency – Securing Wireless Devices in Public Settings
3.1 3.1.16 3.1.17 Access Control
https://media.defense.gov/2021/Jul/29/2002815141/-1/-1/0/CSI_SECURING_WIRELESS_DEVICES_IN_PUBLIC.PDF
This infosheet gives National Security System (NSS), Department of Defense (DoD), and Defense Industrial Base (DIB) users the best practices for securing devices when conducting business in public settings. I
Netgear – What is 802.1x Security Authentication for Wireless Networks?
3.1 3.1.16 3.1.17 Access Control
https://kb.netgear.com/1209/What-is-802-1x-Security-Authentication-for-Wireless-Networks
This webpage provides the reader a basic understanding of 802.1x authentication for wireless networks.
NIST SP 800-153: Guidelines for Securing Wireless Local Area Networks (WLANs)
3.1 3.1.16 3.1.17 Access Control
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-153.pdf
This NIST Special Publication provides organizations with recommendations for improving the security configuration and monitoring of their IEEE 802.11 wireless local area networks.
NIST SP 800-97: Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
3.1 3.1.16 3.1.17 Access Control
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-97.pdf
This NIST Special Publication covers IEEE 802.11i-based wireless LANs only.
http://oirap.rutgers.edu/msa/Documents/OIT-WirelessLAN-Policy.pdf
This sample policy from Rutgers is an example of how an organization can define the requirements associated with access to, and usage of, wireless networks.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blte0e352dc1934ea5f/5e9dfb76d5a1cb709eee4a6e/wireless_communication_policy.pdf
This policy from SANS provides an example of the conditions that wireless infrastructure devices must satisfy to connect to a company network.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt836d5fac43a8727f/5e9dfd035661cd12411d53a6/wireless_communication_standard.pdf
This is a sample wireless communication standard for enterprise customization and implementation.