The organizations wireless policy or wireless remote access policy must include information on locations CMD Wi-Fi access is approved or disapproved.

From Mobile Policy Security Requirements Guide

Part of SRG-MPOL-018

Associated with: CCI-001439

SV-47252r2_rule The organizations wireless policy or wireless remote access policy must include information on locations CMD Wi-Fi access is approved or disapproved.

Vulnerability discussion

If the policy does not include information on Wi-Fi security controls, it is more likely that the security controls will not be implemented properly. Without appropriate controls, Wi-Fi is vulnerable to a number of security breaches. These breaches could involve the interception of sensitive DoD information and the use of the device to connect to DoD networks.

Check content

Review the site wireless security policy or wireless remote access policy. Verify it contains information on locations where CMD Wi-Fi access is approved or disapproved. The following locations will be specifically listed in the policy: - DoD/Government site-managed Wi-Fi access point connected to the NIPRNet (Enclave-NIPRNet Connected). - DoD/Government site-managed Wi-Fi access point connected to the Internet only (Internet Gateway Only Connection). - Public Wi-Fi Hotspot. - Hotel Wi-Fi Hotspot. - Home Wi-Fi network (user-managed). DoD CMD will not be used to connect to Public or Hotel Hotspots. If the site policy does not contain the required information on required CMD Wi-Fi security controls, this is a finding. Note: Applies to any Wi-Fi System.

Fix text

Update the CMD Wi-Fi security policy to include information on locations CMD Wi-Fi access is approved or disapproved.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer