UCF STIG Viewer Logo

Network WLAN Bridge Platform Security Technical Implementation Guide


Overview

Date Finding Count (6)
2021-04-16 CAT I (High): 0 CAT II (Med): 5 CAT III (Low): 1
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC I - Mission Critical Sensitive)

Finding ID Severity Title
V-243228 Medium WLAN components must be Wi-Fi Alliance certified with WPA2 or WPA3.
V-243229 Medium WLAN components must be FIPS 140-2 or FIPS 140-3 certified.
V-243232 Medium The network device must not be configured to have any feature enabled that calls home to the vendor.
V-243231 Medium The network device must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.
V-243230 Medium Wireless access points and bridges must be placed in dedicated subnets outside the enclave's perimeter.
V-243227 Low WLAN SSIDs must be changed from the manufacturer's default to a pseudo random word that does not identify the unit, base, organization, etc.