Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-19904 | WIR0315-03 | SV-22074r1_rule | ECSC-1 ECWN-1 | Medium |
Description |
---|
Broadband systems not compliant with authentication requirements could allow a hacker to gain access to the DoD network. |
STIG | Date |
---|---|
WMAN Access Point Security Technical Implementation Guide (STIG) | 2013-03-14 |
Check Text ( C-25554r1_chk ) |
---|
Detailed Policy Requirements: The IAO has not ensured that site WMAN systems implement strong authentication from the User or WMAN subscriber device to WMAN network. -For tactical or commercial WMAN systems operated in a non-tactical environment: User ID and password or shared secret authentication shall be implemented between the User or WMAN subscriber device to the WMAN network. When user ID and password are used, the complexity requirements of the password must be compliant with JTF-GNO CTO 07-15Rev1: --Password complexity is a case sensitive mixture of upper case letters, lower case letters, special characters, and numbers, including at least one of each. Check Procedures: - For non-tactical WMAN systems, verify the system uses either User ID and password or shared secret authentication between the User or WMAN subscriber device (respectively) to the WMAN network. If User ID and password is used, verify the password meets the complexity requirements of CTO 07-15Rev1. Have the system administrator show the password complexity settings in the management console of the WMAN access point. Mark as a finding if the requirements are not met. |
Fix Text (F-20573r6_fix) |
---|
Comply with requirement. |