STIGQter STIGQter: STIG Summary: Traditional Security Checklist Version: 1 Release: 3 Benchmark Date: 15 Jun 2020:

Information Assurance - Unauthorized Wireless Devices - No Formal Policy and/or Warning Signs

DISA Rule

SV-41280r3_rule

Vulnerability Number

V-31129

Group Title

Information Assurance - Unauthorized Wireless Devices - No Policy or Warning Signs

Rule Version

IA-11.03.01

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

1. A local wireless policy or SOP must be written and available for employee reference.

2. There must be appropriate signage at entrances notifying employees and visitors that wireless devices are not authorized in a classified facility.

3. Wireless policy must be included in initial briefings for new employees and reinforced periodically such as during annual security refresher training.

Check Contents

1. Check to ensure there is a local wireless policy or SOP.

2. During the walk-around, ensure there is appropriate signage at entrances notifying employees and visitors that wireless devices are not authorized in a classified facility.

3. Check that wireless policy is included in initial briefings for new employees and reinforced periodically such as during annual security refresher training.

TACTICAL ENVIRONMENT: The check is applicable to tactical locations where fixed facilities are used for classified processing. Not applicable to mobile/field environments.

Vulnerability Number

V-31129

Documentable

False

Rule Version

IA-11.03.01

Severity Override Guidance

1. Check to ensure there is a local wireless policy or SOP.

2. During the walk-around, ensure there is appropriate signage at entrances notifying employees and visitors that wireless devices are not authorized in a classified facility.

3. Check that wireless policy is included in initial briefings for new employees and reinforced periodically such as during annual security refresher training.

TACTICAL ENVIRONMENT: The check is applicable to tactical locations where fixed facilities are used for classified processing. Not applicable to mobile/field environments.

Check Content Reference

M

Target Key

2506

Comments