UCF STIG Viewer Logo

The operating system must protect wireless access to the system using authentication of users and/or devices.


Overview

Finding ID Version Rule ID IA Controls Severity
V-203689 SRG-OS-000300-GPOS-00118 SV-203689r379459_rule Medium
Description
Allowing devices and users to connect to the system without first authenticating them allows untrusted access and can lead to a compromise or attack. Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication. This requirement applies to those operating systems that control wireless devices.
STIG Date
General Purpose Operating System Security Requirements Guide 2022-11-21

Details

Check Text ( C-3814r374954_chk )
Verify the operating system protects wireless access to the system using authentication of users and/or devices. If it does not, this is a finding.
Fix Text (F-3814r374955_fix)
Configure the operating system to protect wireless access to the system using authentication of users and/or devices.