The organization must confine Wi-Fi and Bluetooth communications to organization-controlled boundaries.

From Mobile Policy Security Requirements Guide

Part of SRG-MPOL-009

Associated with: CCI-001451

SV-47244r2_rule The organization must confine Wi-Fi and Bluetooth communications to organization-controlled boundaries.

Vulnerability discussion

Wireless technologies controlled by this requirement are only Wi-Fi, and Bluetooth. Wireless networks present similar security risks to those of a wired network, and since the open airwaves are the communications medium for wireless technology, an entirely new set of risks are introduced. Implementing wireless computing and networking capabilities in accordance with the organization defined wireless policy, within organization controlled boundaries, greatly reduces vulnerabilities. Note: Not to be used with Class 1 Bluetooth radios.

Check content

Review the organization's access control and procedures addressing wireless implementation and usage (including restrictions), security policy, information system configuration settings, restrictions and any other associated documentation, and other relevant documents or records. Ensure the organization has defined and established organization-controlled boundaries for the implementation of Wi-Fi and Bluetooth communications. If wireless boundaries are not defined and controlled, this is a finding.

Fix text

Define and establish organization controlled boundaries for the implementation of the Wi-Fi and Bluetooth communications.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer