Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-18606 | WIR0340 | SV-20158r1_rule | ECWN-1 | Low |
Description |
---|
If scan results are not properly reported and acted on, then the site could be vulnerable to wireless attack. |
STIG | Date |
---|---|
WMAN Access Point Security Technical Implementation Guide (STIG) | 2013-03-14 |
Check Text ( C-22274r1_chk ) |
---|
Detailed Policy Requirements: Site implements the following procedures for reporting the results of WMAN intrusion scans: The site will implement a wireless incident process and plan, as part of the site’s Incident Response Plan, for reporting unauthorized access, jamming, or electromagnetic interference identified during active electromagnetic scanning. The site will establish a Standard Operating Procedure (SOP) to address intrusion, jamming, or electromagnetic interference. Check Procedures: Review the site Incident Response Plan and determine if it includes procedures for reporting unauthorized access, jamming, or electromagnetic interference identified during active electromagnetic scanning. - Determine if the site has an SOP that addresses intrusion, jamming, or electromagnetic interference. Mark as a finding if either of these requirements are not met. |
Fix Text (F-14436r1_fix) |
---|
Comply with policy. |