Common Controls Hub
WLAN IDS Sensor/Server Security Technical Implementation Guide (STIG)
Finding Count (2)
CAT I (High): 0
CAT II (Med): 1
CAT III (Low): 1
This STIG contains the technical security controls for the operation of a WLAN IDS Sensor and Server in the DoD environment.
I - Mission Critial Classified
I - Mission Critial Public
I - Mission Critial Sensitive
II - Mission Support Classified
II - Mission Support Public
II - Mission Support Sensitive
III - Administrative Classified
III - Administrative Public
III - Administrative Sensitive
Findings (MAC III - Administrative Sensitive)
The site must scan the radio frequency spectrum for unauthorized WLAN devices.
Unauthorized WLAN devices threaten DoD networks in a variety of ways. If someone installs an access point on a DoD network, then people may use that access point to access network resources...
WIDS sensor scan results must be saved for at least one year.
DoDD 8100.2 requires ALL DoD networks use a wireless IDS to scan for unauthorized wireless devices. If sites do not maintain scan logs, it cannot be determined if IDS findings are isolated and...