Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22169 | USB-WUSB-010 | SV-25806r1_rule | ECSC-1 | Medium |
Description |
---|
The use of unauthorized wireless devices can compromise DoD computers, networks, and data. The receiver for a wireless end point provides a wireless port on the computer that could be attacked by a hacker. Wireless transmissions can be intercepted by a hacker and easily viewed if required security is not used. |
STIG | Date |
---|---|
Removable Storage and External Connection Technologies STIG | 2011-01-18 |
Check Text ( C-27325r1_chk ) |
---|
Interview the IAO or site representative. Add the “Wireless Peripheral” asset posture in VMS to the end point asset (e.g., desktop or notebook) and complete the Bluetooth checks as part of the workstation or end point security review. |
Fix Text (F-23392r1_fix) |
---|
For Wireless USB (WUSB) devices, comply with the Wireless STIG peripheral devices policy. |