UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The organization must monitor for unauthorized wireless access to DoD networks.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35945 SRG-MPOL-027 SV-47261r1_rule Medium
Description
DoD networks are at risk for intrusion and DoD data may be compromised if wireless scanning is not conducted to identify unauthorized WLAN clients and access points connected to, or attempting to, connect to the network. DoD components will ensure a Wireless Intrusion Detection System (WIDS) is implemented that allows for monitoring of WLAN activity and the detection of WLAN-related policy violations on all unclassified and classified DoD wired and wireless LANs.
STIG Date
Mobile Policy Security Requirements Guide 2013-01-24

Details

Check Text ( C-44182r1_chk )
Review the organization's network diagrams, accreditation documentation, and roles and responsibilities descriptions to ensure wireless intrusion detection capabilities are installed and monitored by approved personnel. If the organization's wireless intrusion detection system (WIDS) is not documented, installed, and configured to monitor the network for unauthorized access, this is a finding.
Fix Text (F-40470r1_fix)
Document and implement monitoring for unauthorized wireless access to DoD networks by the organization.