UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

A WMAN system transmitting classified data must implement required data encryption controls.


Overview

Finding ID Version Rule ID IA Controls Severity
V-18604 WIR0330 SV-20156r1_rule ECWN-1 High
Description
If not compliant, classified data could be compromised.
STIG Date
WMAN Access Point Security Technical Implementation Guide (STIG) 2013-03-14

Details

Check Text ( C-22272r1_chk )
Detailed Policy Requirements:

Site WMAN systems that transmit classified data must implement the following data encryption controls:

- The WMAN system must implement FIPS 140-2 validated encryption to protect the ISO OSI Layer 2 radio data frames. The WMAN system will be configured for AES-CCM encryption, if supported by the WMAN system. (Not required for classified WMAN bridges.)
- The WMAN system must implement NSA Type 1 certified High Assurance Internet Protocol Encryptor (HAIPE) encryption, other NSA Type 1 certified encryption, or NSA approved Suite B overlay encryption at ISO OSI Layer 3 to protect data being transmitted.

Check Procedures:

Review the WMAN product specification sheets.
- Verify FIPS 140-2 validated encryption is being used at OSI Layer 2 to protect the radio data frames.
- Determine if the system supports AES-CCM encryption. If yes, verify the system has been configured for AES-CCM encryption.
- Verify NSA Type 1 certified High Assurance Internet Protocol Encryptor (HAIPE) encryption, other NSA Type 1 certified encryption, or NSA approved Suite B overlay encryption is being used at OSI Layer 3 to protect data being transmitted.

Mark as a finding if any of these requirements have not been met.

Fix Text (F-14436r1_fix)
Comply with policy.