V-12072 | High | Wireless devices are not permitted in a permanent, temporary, or mobile Sensitive Compartmented Information Facilities (SCIFs), unless approved by the SCIF Cognizant Security Authority (CSA) in accordance with Intelligence Community Directive 503 and Director Central Intelligence Directive (DCID) 6/9, the DAA, and the site Special Security Officer (SSO).
For SME PED:
This requirement is not applicable. This check will automatically be included in a security reviewer’s checklist by VMS. | Emanations from computing devices in the secured area may be transmitted or picked up inadvertently by wireless devices. |
V-8283 | High | All wireless systems (including associated peripheral devices, operating system, applications, network/PC connection methods, and services) must be approved by the Designated Approval Authority (DAA) prior to installation and use for processing DoD information.
| Unauthorized wireless systems expose DoD networks to attack. The DAA and appropriate commanders must be aware of all wireless systems used at the site. All wireless systems must be kept to a... |
V-19813 | High | Computers with an embedded wireless system must have the radio removed before the computer is used to transfer, receive, store, or process classified information. | With the increasing popularity of wireless networking, many OEMs embedded the wireless NIC in the
computer. Although the system administrator may disable these embedded NICs, the user... |
V-14894 | Medium | All wireless network devices such as wireless Intrusion Detection System (IDS) and wireless routers, access points, gateways, and controllers must be located in a secure room with limited access or otherwise secured to prevent tampering or theft. | DoD data and the network could be exposed to attack if wireless network devices are not physically protected. The NSO will ensure all wireless network devices (i.e., IDS, routers, servers, Remote... |
V-12106 | Medium | Wireless devices must not be operated in areas where classified information is electronically stored, processed, or transmitted unless required conditions are followed.
Note: This requirement is Not Applicable for SME PED. | The operation of electronic equipment and emanations must be controlled in and around areas where sensitive information is kept or processed. Sites should post signs and train users to this... |
V-13982 | Low | All users of mobile devices or wireless devices must sign a user agreement before the mobile or wireless device is issued to the user and the user agreement used at the site does must include required content listed below. | Lack of user training and understanding of responsibilities to safeguard wireless technology are a significant vulnerability to the enclave. Once policies are established, users must be trained... |
V-8297 | Low | Wireless devices that connect directly or indirectly (e.g., ActiveSync, wireless, etc.) to the network will be included in the site System Security Plan (SSP). | The DAA and site commander must be aware of all approved wireless devices used at the site or DoD data could be exposed to unauthorized people. Documentation of the enclave configuration must... |
V-8284 | Low | The site IAO will maintain a list of all DAA-approved wireless and non-wireless PED devices that store, process, or transmit DoD information. | The site must maintain a list of all DAA-approved wireless devices. Close tracking of authorized wireless devices will facilitate the search for rogue devices. Sites must keep good inventory... |
V-15782 | Low | DAA must approve the use of personally-owned PEDs that are used to transmit, receive, store, or process DoD information. Owner must sign a forfeiture agreement in case of a security incident. | The use of unauthorized personally-owned wireless devices to receive, store, process or transmit DoD data could expose sensitive DoD data to unauthorized people. The use of personally-owned PEDs... |