UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IDPS must monitor for unauthorized connections of mobile devices to information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
V-34537 SRG-NET-000071-IDPS-00057 SV-45379r1_rule Medium
Description
This control requires access control for portable and mobile devices. Mobile devices include portable storage media (e.g., USB memory sticks, external hard disk drives) and portable computing and communications devices with information storage capability (e.g., notebook/laptop computers, personal digital assistants, cellular telephones, digital cameras, and audio recording devices). Unless restrictions are put in place, a user connecting to the enclave via a mobile device can access/perform everything they could access/perform as those connected via Ethernet. Monitoring will ensure unauthorized access to the enclave’s resources and data will not go undetected. Some IDPS sensors may be able to monitor for device IDs or other markers of various mobile devices.
STIG Date
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide 2012-11-19

Details

Check Text ( C-42728r1_chk )
Verify rules exist to monitor for unauthorized mobile devices. Mobile devices include: USB memory sticks, external hard disk drives, notebook/laptop computers, personal digital assistants, cellular telephones, digital cameras, and audio recording devices.

If rules do not exist that monitor for mobile devices, this is a finding.
Fix Text (F-38776r1_fix)
Create rules to monitor for mobile device IDs or other markers of mobile devices.