The organisation's wireless access points shall be secured.
The organization's networks when accessed remotely shall be secured, including through multi-factor authentication (MFA).
Usage restrictions, connection requirements, implementation guidance, and authorizations for remote access to the organization’s critical systems environment shall be identified, documented and implemented.
Remote access to the organization’s critical systems shall be monitored and cryptographic mechanisms shall be implemented where determined necessary.
The security for connections with external systems shall be verified and framed by documented agreements.