UCF STIG Viewer Logo

The IDPS must detect rogue wireless devices, attack attempts, and potential compromises or breaches to the wireless network.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000266-IDPS-000236 SRG-NET-000266-IDPS-000236 SRG-NET-000266-IDPS-000236_rule Medium
Description
DoD information could be compromised if wireless scanning is not performed to identify unauthorized WLAN clients and access points connected to or attempting to connect to the network. A wireless IDS (WIDS) sensor must be installed and placed to monitor wireless network transmissions for possible attacks and unauthorized traffic. Rogue devices are unauthorized wireless devices which are either connected to the enclave or are being used by personnel in DoD spaces. These devices may either provide attackers with a way into the enclave or attempt to breach the network.
STIG Date
IDPS Security Requirements Guide (SRG) 2012-03-08

Details

Check Text ( C-43408_chk )
Verify the WIDS is configured to monitor the network for unauthorized wireless devices. Verify the configuration will detect devices which are using non-standard wireless protocols. Verify the placement of the WIDS will detect devices transmitting in all offices and work spaces for the site.

If the WIDS is not configured to detect rogue wireless devices, this is a finding.
Fix Text (F-43408_fix)
Configure the WIDS to monitor for rogue wireless devices.