Version | Date | Finding Count (1) | ||
---|---|---|---|---|
1 | 2011-10-10 | CAT I (High): 0 | CAT II (Med): 1 | CAT III (Low): 0 |
STIG Description |
---|
This STIG contains the policy, training, and operating procedure security controls for WLAN access points operated in the DoD environment. |
Finding ID | Severity | Title | Description |
---|---|---|---|
V-18596 | Medium | The site will conduct continuous wireless IDS scanning. Note: This requirement applies to all DoD sites that operate DoD computer networks, including sites that have no authorized WLAN systems. | DoD networks are at risk and DoD data could be compromised if wireless scanning is not conducted to identify unauthorized WLAN clients and access points connected to or attempting to connect to... |