UCF STIG Viewer Logo

RFID Workstation Security Technical Implementation Guide (STIG)


Date Finding Count (2)
2013-03-14 CAT I (High): 0 CAT II (Med): 1 CAT III (Low): 1
STIG Description
This STIG contains the technical security controls for the operation of a RFID Workstation in the DoD environment.

Available Profiles

Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-18625 Medium PDA and Smartphones that are connected to DoD Windows computers via a USB connection must be compliant with requirements.
V-14034 Low If a wireless connection (e.g. WLAN, Bluetooth) is used between the RFID scanner and RFID workstation, security requirements must be followed.