UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Site WMAN systems must implement strong authentication from the user or WMAN subscriber device to WMAN network.


Overview

Finding ID Version Rule ID IA Controls Severity
V-19903 WIR0315-02 SV-22073r1_rule ECSC-1 ECWN-1 Medium
Description
Broadband systems not compliant with authentication requirements could allow a hacker to gain access to the DoD network.
STIG Date
WMAN Access Point Security Technical Implementation Guide (STIG) 2013-03-14

Details

Check Text ( C-25553r1_chk )
Detailed Policy Requirements:

The site WMAN systems must implement strong authentication from the User or WMAN subscriber device to WMAN network.

-For tactical or commercial WMAN systems operated in a non-tactical environment: User ID and password or shared secret authentication shall be implemented between the user or WMAN subscriber device to the WMAN network. When user ID/Password are used, the length requirements of the password must be compliant with JTF-GNO CTO 07-15Rev1:
o 15 character password length (or the maximum length supported by the system if a 15 character password is not supported).

Check Procedures:

For non-tactical WMAN systems, verify the system uses either User ID and password or shared secret authentication between the User or WMAN subscriber device (respectively) to the WMAN network. If User ID and password is used, verify the password meets the length requirements of CTO 07-15Rev1.

Mark as a finding if the password length requirements are not met.
Fix Text (F-20573r6_fix)
Comply with requirement.