Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-7075 | WIR0230 | SV-7459r1_rule | ECSC-1 | Low |
Description |
---|
Written procedures provide assurance that personnel take the required steps to prevent loss of keys or other breaches of system security. |
STIG | Date |
---|---|
L3 KOV-26 Talon (Wireless Role) Security Technical Implementation Guide (STIG) | 2014-04-07 |
Check Text ( C-4017r1_chk ) |
---|
Interview IAO. Verify written operating procedures exist for the protection, handling, accounting, and use of NSA Type 1 certified WLAN products and keys in a SWLAN operational environment. |
Fix Text (F-6771r1_fix) |
---|
Document procedures for the protection, handling, accounting, and use of NSA Type 1 certified WLAN products and keys. |