STIGQter STIGQter: STIG Summary: WLAN Bridge Security Technical Implementation Guide (STIG) Version: 6 Release: 15 Benchmark Date: 26 Apr 2019:

WLAN SSIDs must be changed from the manufacturer’s default to a pseudo random word that does not identify the unit, base, organization, etc.

DISA Rule

SV-15614r1_rule

Vulnerability Number

V-14846

Group Title

Change WLAN SSID default

Rule Version

WIR0105

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Change the SSID to a pseudo random word that does not identify the unit, base, or organization.

Check Contents

Review device configuration.
1. Obtain the SSID using a wireless scanner or the AP or WLAN controller management software.
2. Verify the name is not meaningful (e.g., site name, product name, room number, etc.) or set to the manufacturer's default value.

Mark as a finding if the SSID does not meet the requirement listed above.

Vulnerability Number

V-14846

Documentable

False

Rule Version

WIR0105

Severity Override Guidance

Review device configuration.
1. Obtain the SSID using a wireless scanner or the AP or WLAN controller management software.
2. Verify the name is not meaningful (e.g., site name, product name, room number, etc.) or set to the manufacturer's default value.

Mark as a finding if the SSID does not meet the requirement listed above.

Check Content Reference

M

Responsibility

System Administrator

Target Key

1535

Comments