UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

WLAN SSIDs must be changed from the manufacturer's default to a pseudo random word that does not identify the unit, base, organization, etc.


Overview

Finding ID Version Rule ID IA Controls Severity
V-243217 WLAN-NW-000200 SV-243217r720106_rule Low
Description
An SSID identifying the unit, site, or purpose of the WLAN or that is set to the manufacturer default may cause an OPSEC vulnerability.
STIG Date
Network WLAN AP-NIPR Platform Security Technical Implementation Guide 2021-04-16

Details

Check Text ( C-46492r720104_chk )
Review device configuration.

1. Obtain the SSID using a wireless scanner or the AP or WLAN controller management software.
2. Verify the name is not meaningful (e.g., site name, product name, room number, etc.) and is not set to the manufacturer's default value.

If the SSID does not meet the requirement listed above, this is a finding.
Fix Text (F-46449r720105_fix)
Change the SSID to a pseudo random word that does not identify the unit, base, or organization.