Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-57219 | SRG-OS-000300-GPOS-00118 | SV-71479r1_rule | Medium |
Description |
---|
Allowing devices and users to connect to the system without first authenticating them allows untrusted access and can lead to a compromise or attack. Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication. This requirement applies to those operating systems that control wireless devices. |
STIG | Date |
---|---|
General Purpose Operating System SRG | 2014-12-17 |
Check Text ( C-57815r1_chk ) |
---|
Verify the operating system protects wireless access to the system using authentication of users and/or devices. If it does not, this is a finding. |
Fix Text (F-62139r1_fix) |
---|
Configure the operating system to protect wireless access to the system using authentication of users and/or devices. |