UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The site must have written procedures for the protection, handling, accounting, and use of NSA Type 1 products.


Overview

Finding ID Version Rule ID IA Controls Severity
V-7075 WIR0230 SV-7459r1_rule ECSC-1 Low
Description
Written procedures provide assurance that personnel take the required steps to prevent loss of keys or other breaches of system security.
STIG Date
L3 KOV-26 Talon (Wireless Role) Security Technical Implementation Guide (STIG) 2014-04-07

Details

Check Text ( C-4017r1_chk )
Interview IAO. Verify written operating procedures exist for the protection, handling, accounting, and use of NSA Type 1 certified WLAN products and keys in a SWLAN operational environment.
Fix Text (F-6771r1_fix)
Document procedures for the protection, handling, accounting, and use of NSA Type 1 certified WLAN products and keys.