The operating system must protect wireless access to the system using authentication of users and/or devices.
Overview
Finding ID
Version
Rule ID
IA Controls
Severity
V-203689
SRG-OS-000300-GPOS-00118
SV-203689r991569_rule
Medium
Description
Allowing devices and users to connect to the system without first authenticating them allows untrusted access and can lead to a compromise or attack.
Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication.
This requirement applies to those operating systems that control wireless devices.