UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The WMAN site must implement required procedures for reporting the results of WMAN intrusion scans.


Overview

Finding ID Version Rule ID IA Controls Severity
V-18606 WIR0340 SV-20158r1_rule ECWN-1 Low
Description
If scan results are not properly reported and acted on, then the site could be vulnerable to wireless attack.
STIG Date
WMAN Access Point Security Technical Implementation Guide (STIG) 2013-03-14

Details

Check Text ( C-22274r1_chk )
Detailed Policy Requirements:

Site implements the following procedures for reporting the results of WMAN intrusion scans:

The site will implement a wireless incident process and plan, as part of the site’s Incident Response Plan, for reporting unauthorized access, jamming, or electromagnetic interference identified during active electromagnetic scanning.

The site will establish a Standard Operating Procedure (SOP) to address intrusion, jamming, or electromagnetic interference.

Check Procedures:

Review the site Incident Response Plan and determine if it includes procedures for reporting unauthorized access, jamming, or electromagnetic interference identified during active electromagnetic scanning.
- Determine if the site has an SOP that addresses intrusion, jamming, or electromagnetic interference.
Mark as a finding if either of these requirements are not met.
Fix Text (F-14436r1_fix)
Comply with policy.