UCF STIG Viewer Logo

If the site uses periodic WIDS scanning, then the system must be configured to meet the requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000071-IDPS-000019 SRG-NET-000071-IDPS-000019 SRG-NET-000071-IDPS-000019_rule Medium
Description
Unauthorized WLAN devices threaten DoD networks in a variety of ways. If someone installs an access point on a DoD network, then people may use that access point to access network resources without any perimeter security controls, which significantly degrades the IA posture of that network. If someone installs an unauthorized access point in the site's vicinity, even if not connected to a DoD network, then site users may unknowingly or inadvertently connect to it. Once this connection occurs, the user's traffic may be diverted to spoofed web sites and other servers to capture the user's authentication credentials and sensitive DoD data. Finally, if an unauthorized WLAN client is operating inside or near the site, it may improperly connect to the site's WLAN infrastructure or other network devices that improperly have left open active Wi-Fi interfaces. WIDS can help counter all of these threats. DoDD 8100.2 requires ALL DoD networks use a wireless IDS to scan for unauthorized wireless devices. While not recommended, WLAN access points that also provide WIDS scanning capability are acceptable as "continuous scanning" WIDS sensors. (I) The DAA will determine how often WIDS scanning will be conducted based on the results of the wireless risk assessment. (DISA recommends at least every 90 days.) (ii) Periodic scanning will be conducted by using handheld or laptop WIDS scanners during a walk-through assessment of the network environment. NOTE: The WIDS must cover all WLAN frequencies transmitted by the WLAN equipment. The WLAN frequency band can vary by country and the WIDS must cover all channels being used in a country the equipment is being used in. For example, the allowed WLAN channels are different in the U.S., Japan, and many European countries.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43135_chk )
Verify the DAA has determined the frequency of the scans. Review the DAA approved wireless risk assessment.

If periodic scanning is not performed on a DAA approved schedule, this is a finding.
If the continuous scanning method used, this is a finding.
Fix Text (F-43135_fix)
Obtain DAA approval of the scanning frequency.
Perform periodic scanning by using handheld or laptop WIDS scanners during a walk-through assessment of the network environment.