UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Information Assurance - Unauthorized Wireless Devices - Connected to the SIPRNet


Overview

Finding ID Version Rule ID IA Controls Severity
V-31127 IA-11.01.01 SV-41269r2_rule ECWN-1 High
Description
Finding unauthorized wireless devices connected and/or operating on the SIPRNet is a security incident and could directly result in the loss or compromise of classified or sensitive information either intentionally or accidentally.
STIG Date
Traditional Security 2013-07-11

Details

Check Text ( C-39819r2_chk )
1. Check during the walk-around to ensure that unauthorized wireless devices are not connected to the Network (SIPRNet).

2. Consult with Network Reviewers and Wireless Scanners to ensure they have not detected wireless devices.

TACTICAL ENVIRONMENT: The check is applicable for ALL classified processing environments.
Fix Text (F-35016r2_fix)
Unauthorized wireless devices, such as phones, PDAs, Laptops, etc., must not be connected to the SIPRNet or other classified system/network being reviewed.