https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/116057-site-survey-guidelines-wlan-00.html
The intended purpose of this document is to provide guidelines for proper planning, preparation, and identification of the key items to check through the analysis of a survey report.
https://www.cisco.com/c/en/us/products/wireless/what-is-wi-fi-security.html
This webpage provides the reader a basic understanding of the various wireless encryption types.
Cox Blue – 10 Ways To Secure Your Business WiFi Network
3.1 3.1.16 3.1.17 Access Control
https://www.coxblue.com/10-steps-to-take-right-now-to-secure-your-business-wifi-network/
Follow these 10 steps today to make your network and business information safer.
National Security Agency – Securing Wireless Devices in Public Settings
3.1 3.1.16 3.1.17 Access Control
https://media.defense.gov/2021/Jul/29/2002815141/-1/-1/0/CSI_SECURING_WIRELESS_DEVICES_IN_PUBLIC.PDF
This infosheet gives National Security System (NSS), Department of Defense (DoD), and Defense Industrial Base (DIB) users the best practices for securing devices when conducting business in public settings. I
Netgear – What is 802.1x Security Authentication for Wireless Networks?
3.1 3.1.16 3.1.17 Access Control
https://kb.netgear.com/1209/What-is-802-1x-Security-Authentication-for-Wireless-Networks
This webpage provides the reader a basic understanding of 802.1x authentication for wireless networks.
NIST SP 800-153: Guidelines for Securing Wireless Local Area Networks (WLANs)
3.1 3.1.16 3.1.17 Access Control
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-153.pdf
This NIST Special Publication provides organizations with recommendations for improving the security configuration and monitoring of their IEEE 802.11 wireless local area networks.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175Br1.pdf
This NIST Special Publication is one part in a series of documents intended to provide guidance to the Federal Government for using cryptography to protect its sensitive, but unclassified digitized information during transmission and while in storage.
NIST SP 800-97: Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
3.1 3.1.16 3.1.17 Access Control
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-97.pdf
This NIST Special Publication covers IEEE 802.11i-based wireless LANs only.
http://oirap.rutgers.edu/msa/Documents/OIT-WirelessLAN-Policy.pdf
This sample policy from Rutgers is an example of how an organization can define the requirements associated with access to, and usage of, wireless networks.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blte0e352dc1934ea5f/5e9dfb76d5a1cb709eee4a6e/wireless_communication_policy.pdf
This policy from SANS provides an example of the conditions that wireless infrastructure devices must satisfy to connect to a company network.