Check: SRG-OS-000300-GPOS-00118
General Purpose Operating System SRG:
SRG-OS-000300-GPOS-00118
(in versions v2 r7 through v1 r4)
Title
The operating system must protect wireless access to the system using authentication of users and/or devices. (Cat II impact)
Discussion
Allowing devices and users to connect to the system without first authenticating them allows untrusted access and can lead to a compromise or attack. Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication. This requirement applies to those operating systems that control wireless devices.
Check Content
Verify the operating system protects wireless access to the system using authentication of users and/or devices. If it does not, this is a finding.
Fix Text
Configure the operating system to protect wireless access to the system using authentication of users and/or devices.
Additional Identifiers
Rule ID: SV-203689r379459_rule
Vulnerability ID: V-203689
Group Title: SRG-OS-000300
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001443 |
The information system protects wireless access to the system using authentication of users and/or devices. |
Controls
Number | Title |
---|---|
AC-18 (1) |
Authentication And Encryption |