The access to private wireless networks
must be restricted through user credentials
CIS Controls. 1.7 Deploy Port Level Access Control: Utilize port level access control, following 802.1x standards, to control which devices can authenticate to the network.
ISO 27001:2013. Annex A - 9.1.2: Users should only have access to the internal network and network services for which they have been explicitly authorized.