UCF STIG Viewer Logo

The site must have written procedures for the protection, handling, accounting, and use of NSA Type 1 products.


Overview

Finding ID Version Rule ID IA Controls Severity
V-7075 WIR0230 SV-7459r1_rule ECSC-1 Low
Description
Written procedures provide assurance that personnel take the required steps to prevent loss of keys or other breaches of system security.
STIG Date
L3 KOV-26 Talon (Wireless Role) Security Technical Implementation Guide (STIG) 2014-04-07

Details

Check Text ( C-4017r1_chk )
Interview IAO. Verify written operating procedures exist for the protection, handling, accounting, and use of NSA Type 1 certified WLAN products and keys in a SWLAN operational environment.
Fix Text (F-6771r1_fix)
Document procedures for the protection, handling, accounting, and use of NSA Type 1 certified WLAN products and keys.