Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-34781 | SRG-NET-000266-IDPS-00191 | SV-45706r1_rule | Medium |
Description |
---|
DoD information could be compromised if wireless monitoring is not performed to identify unauthorized WLAN clients and access points connected to or attempting to connect to the network. A WIDS sensor must be installed and placed to monitor wireless network transmissions for possible attacks and unauthorized traffic. Rogue devices are unauthorized wireless devices which are either connected to the enclave or are being used by personnel in DoD spaces. These devices may either provide attackers with a way into the enclave or attempt to breach the network. |
STIG | Date |
---|---|
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide | 2012-11-19 |
Check Text ( C-43072r1_chk ) |
---|
Verify the WIDS is configured to monitor the network for unauthorized wireless devices. Verify the configuration will detect devices which are using non-standard wireless protocols. Verify the placement of the WIDS will detect devices transmitting in all offices and work spaces for the site. If the WIDS is not configured to detect rogue wireless devices, this is a finding. |
Fix Text (F-39104r1_fix) |
---|
Configure the WIDS to monitor for rogue wireless devices. |