UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Network WLAN Bridge Platform Security Technical Implementation Guide


Overview

Date Finding Count (6)
2023-02-13 CAT I (High): 0 CAT II (Med): 5 CAT III (Low): 1
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC I - Mission Critical Sensitive)

Finding ID Severity Title
V-243228 Medium WLAN components must be Wi-Fi Alliance certified with WPA2 or WPA3.
V-243229 Medium WLAN components must be FIPS 140-2 or FIPS 140-3 certified and configured to operate in FIPS mode.
V-243232 Medium The network device must not be configured to have any feature enabled that calls home to the vendor.
V-243231 Medium The network device must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.
V-243230 Medium Wireless access points and bridges must be placed in dedicated subnets outside the enclave's perimeter.
V-243227 Low WLAN SSIDs must be changed from the manufacturer's default to a pseudo random word that does not identify the unit, base, organization, etc.