DISA STIGS Viewer

The VMM must protect wireless access to the system using authentication of users and/or devices.

Overview

Finding ID Version Rule ID IA Controls Severity
V-207438 SRG-OS-000300-VMM-001070 SV-207438r958678_rule   Medium
Description
Allowing devices and users to connect to the system without first authenticating them allows untrusted access and can lead to a compromise or attack. Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication. This requirement applies to those VMMs that control wireless devices.
STIG Date
Virtual Machine Manager Security Requirements Guide 2024-12-06

Details

Check Text (C-7695r365724_chk)
Verify the VMM protects wireless access to the system using authentication of users and/or devices.

If it does not, this is a finding.
Fix Text (F-7695r365725_fix)
Configure the VMM to protect wireless access to the system using authentication of users and/or devices.