UCF STIG Viewer Logo

WLAN Client Security Technical Implementation Guide


Overview


Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-30255 Medium The WLAN must be WPA2-Enterprise certified.
V-3503 Medium WLAN-capable devices must not use wireless peer-to-peer networks to connect to other devices.
V-3692 Medium WLAN must use EAP-TLS.
V-3515 Medium The WLAN must use AES-CCMP to protect data-in-transit.
V-19900 Medium The WLAN implementation of EAP-TLS must be FIPS 140-2 validated.
V-14202 Medium FIPS 140-2 validated encryption modules must be used to encrypt unclassified sensitive data at rest on the wireless device (e.g., laptop, PDA, smartphone).
V-4632 Medium Laptops with WLAN interfaces must have the WLAN card radio set to OFF as the default setting.
V-14274 Medium All wireless devices must be configured according to applicable operating system STIGs.
V-18630 Medium DoD network users authorized to remotely connect to the DoD network via a home wireless LAN (WLAN) must use a separate WLAN for DoD computers.
V-30257 Medium WLAN EAP-TLS implementation must use CAC authentication to connect to DoD networks.
V-14002 Medium A device’s wired network interfaces (e.g., Ethernet) must be disconnected or otherwise disabled when wireless connections are in use.
V-18748 Medium DoD network users authorized to remotely connect to the DoD network from a residential WLAN must ensure that the access point uses Network Address Translation (NAT).
V-18631 Medium DoD network users authorized to remotely connect to a DoD network from a residential WLAN must do so using an access point that is WPA2 certified.
V-30358 Medium DoD network users authorized to remotely connect to a DoD network from a residential WLAN must configure the access point with a strong pre-shared key (PSK) passcode.
V-19894 Medium The WLAN implementation of AES-CCMP must be FIPS 140-2 validated.
V-18747 Low DoD network users authorized to remotely connect to the DoD network from a residential WLAN must change the default SSID to an SSID that does not reveal the WLAN is used to transmit DoD data.
V-14004 Low WLAN equipment obtained through acquisition programs must be JITC interoperability certified.
V-7072 Low WLAN clients must not be configured to connect to other WLAN devices without the user initiating a request to establish such a connection.
V-19895 Low The Information Assurance component of the WLAN system must be NIAP Common Criteria certified for basic or medium robustness for data in transit.