UCF STIG Viewer Logo

The IDPS must enforce requirements for the connection of mobile devices to organizational information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000072-IDPS-NA SRG-NET-000072-IDPS-NA SRG-NET-000072-IDPS-NA_rule Low
Description
Wireless services enable users within close proximity of access points to have access to data and services within the private network. The security boundary of a Wireless LAN extends from the client device to the network boundary where network access is controlled. This boundary represents the portion of the network most vulnerable to attack and must be protected. Wireless access introduces security risks which must be addressed through implementation of strict controls and procedures such as, authentication, encryption, and defining what resources can be accessed.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43137_chk )
This requirement does not apply to IDPS.
Fix Text (F-43137_fix)
Not applicable for IDPS. No fix required.