Review the DoD component wireless architecture. Determine if the organization employs a WIDS. The WIDS must continuously scan for and detect authorized and unauthorized WLAN activities. If a WIDS is not employed in the architecture, this is a finding.
Exceptions can be granted by the DAA for minimal impact WLANs systems. Minimal impact WLANs systems are systems that: do not provide connectivity to WLAN-enabled PEDs (e.g., backhaul systems); have no available FIPS 140 validated, 802.1X, EAP-TLS supplicant; support a very small number of users for a specific mission (i.e., 10 or less users); are standalone networks; or are highly specialized WLAN systems that are isolated from the GIG (e.g., handheld personal digital assistants (PDAs) used as radio-frequency identification (RFID) readers, a network of WLAN-enabled Voice over Internet Protocol (VoIP) phones). These systems shall be segmented from the GIG via a wireless demilitarized zone (DMZ) that provides network intrusion detection capabilities and limits ports and protocols to the minimum set necessary to achieve mission objectives. A STIG-compliant firewall shall be located at the system’s point of entry onto the GIG. |