Check: WIR0500
RFID Scanner STIG (STIG):
WIR0500
(in version v6 r8)
Title
If a wireless connection (e.g. WLAN, Bluetooth) is used between the RFID scanner and RFID workstation, security requirements must be followed. (Cat III impact)
Discussion
Sensitive data stored on the RFID scanner and transmitted to the workstation could be compromised.
Check Content
Detail Policy Requirements: If a wireless connection (e.g. WLAN, Bluetooth) is used between the RFID scanner and RFID workstation, the following requirements must be followed: - If WLAN is used for the wireless connection, assign “WLAN Client” asset posture in VMS to the workstation (or PDA) asset and complete WLAN checks assigned to the workstation (or PDA). - If Bluetooth or some other wireless technology is used for the wireless connection, assign “Bluetooth” asset posture in VMS to the workstation (or PDA) asset and complete Bluetooth checks assigned to the workstation(or PDA). Check Procedures: Verify that the appropriate VMS wireless posture has been assigned to the RFID workstation (or PDA) asset and the appropriate checks have been completed. Mark as a finding if the requirement has not been met.
Fix Text
Comply with the security requirements associated with the technology enabling wireless communication between the RFID scanner and RFID computing infrastructure.
Additional Identifiers
Rule ID: SV-14645r1_rule
Vulnerability ID: V-14034
Group Title: Wireless RFID workstation / scanner compliant
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |