Version | Date | Finding Count (2) | ||
---|---|---|---|---|
6 | 2013-03-14 | CAT I (High): 0 | CAT II (Med): 1 | CAT III (Low): 1 |
STIG Description |
---|
This STIG contains the technical security controls for the operation of a WLAN IDS Sensor and Server in the DoD environment. |
Finding ID | Severity | Title | Description |
---|---|---|---|
V-14887 | Medium | The site must scan the radio frequency spectrum for unauthorized WLAN devices. | Unauthorized WLAN devices threaten DoD networks in a variety of ways. If someone installs an access point on a DoD network, then people may use that access point to access network resources... |
V-19896 | Low | WIDS sensor scan results must be saved for at least one year. | DoDD 8100.2 requires ALL DoD networks use a wireless IDS to scan for unauthorized wireless devices. If sites do not maintain scan logs, it cannot be determined if IDS findings are isolated and... |