Common Controls Hub
RFID Workstation Security Technical Implementation Guide (STIG)
Finding Count (2)
CAT I (High): 0
CAT II (Med): 1
CAT III (Low): 1
This STIG contains the technical security controls for the operation of a RFID Workstation in the DoD environment.
I - Mission Critial Classified
I - Mission Critial Public
I - Mission Critial Sensitive
II - Mission Support Classified
II - Mission Support Public
II - Mission Support Sensitive
III - Administrative Classified
III - Administrative Public
III - Administrative Sensitive
Findings (MAC II - Mission Support Classified)
PDA and Smartphones that are connected to DoD Windows computers via a USB connection must be compliant with requirements.
PDAs with flash memory can introduce malware to a PC when they are connected for provisioning of the PDA or to transfer data between the PC and PDA, particularly if the PDA is seen by the PC as a...
If a wireless connection (e.g. WLAN, Bluetooth) is used between the RFID scanner and RFID workstation, security requirements must be followed.
Sensitive data stored on the RFID scanner and transmitted to the workstation could be compromised.