UCF STIG Viewer Logo

The site must have written procedures for the protection, handling, accounting, and use of NSA Type 1 products.


Overview

Finding ID Version Rule ID IA Controls Severity
V-7075 WIR0230 SV-7459r1_rule Low
Description
Written procedures provide assurance that personnel take the required steps to prevent loss of keys or other breaches of system security.
STIG Date
Harris SecNet 11 / 54 Security Technical Implementation Guide (STIG) 2016-11-14

Details

Check Text ( C-4017r1_chk )
Interview IAO. Verify written operating procedures exist for the protection, handling, accounting, and use of NSA Type 1 certified WLAN products and keys in a SWLAN operational environment.
Fix Text (F-6771r1_fix)
Document procedures for the protection, handling, accounting, and use of NSA Type 1 certified WLAN products and keys.