Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-30381 | SRG-OS-000273 | SV-40048r1_rule | Medium |
Description |
---|
Wireless access introduces security risks which must be addressed through implementation of strict controls and procedures such as authentication, encryption, and defining what resources that can be accessed. The organization will define the requirements for connection of mobile devices. In order to ensure that the connection provides adequate integrity and confidentiality of the connection, the operating system must enforce these requirements. |
STIG | Date |
---|---|
Operating System Security Requirements Guide | 2013-03-28 |
Check Text ( None ) |
---|
None |
Fix Text (None) |
---|
None |