UCF STIG Viewer Logo

For Wireless USB (WUSB) devices, comply with the Wireless STIG peripheral devices policy.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22169 USB-WUSB-010 SV-25806r1_rule Medium
Description
The use of unauthorized wireless devices can compromise DoD computers, networks, and data. The receiver for a wireless end point provides a wireless port on the computer that could be attacked by a hacker. Wireless transmissions can be intercepted by a hacker and easily viewed if required security is not used.
STIG Date
Removable Storage and External Connections Security Technical Implementation Guide 2017-09-25

Details

Check Text ( C-27325r1_chk )
Interview the IAO or site representative.

Add the “Wireless Peripheral” asset posture in VMS to the end point asset (e.g., desktop or notebook) and complete the Bluetooth checks as part of the workstation or end point security review.
Fix Text (F-23392r1_fix)
For Wireless USB (WUSB) devices, comply with the Wireless STIG peripheral devices policy.