PCI Requirement 12.3.6 – Acceptable Network Locations for the Technologies
PCI Requirement 12.3.2 – Authentication for Use of the Technology
PCI Requirement 12.5.1 – Establish, Document, and Distribute Security Policies and Procedures
13.1.14 Locate a Rogue Wireless Access Point