UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The organization must employ a wireless Intrusion Detection System (IDS) to detect potential compromises/breaches to the information system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27096 SRG-APP-NA SV-34391r1_rule Medium
Description
Wireless IDS is used to detect and alarm on known attack patterns. This is a requirement to deploy wireless IDS network monitoring. This does not apply to applications.
STIG Date
Application Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None