Skip to content

Network WLAN AP-NIPR Platform Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000383

    Group
  • The site must conduct continuous wireless Intrusion Detection System (IDS) scanning.

    DoD networks are at risk and DoD data could be compromised if wireless scanning is not conducted to identify unauthorized WLAN clients and access points connected to or attempting to connect to the...
    Rule Medium Severity
  • WLAN must use EAP-TLS.

    EAP-TLS provides strong cryptographic mutual authentication and key distribution services not found in other EAP methods, and thus provides significantly more protection against attacks than other ...
    Rule Medium Severity
  • WLAN EAP-TLS implementation must use certificate-based PKI authentication to connect to DoD networks.

    DoD certificate-based PKI authentication is strong, two-factor authentication that relies on carefully evaluated cryptographic modules. Implementations of EAP-TLS that are not integrated with certi...
    Rule Medium Severity
  • Wireless access points and bridges must be placed in dedicated subnets outside the enclave's perimeter.

    If an adversary is able to compromise an access point or controller that is directly connected to an enclave network, the adversary can easily surveil and attack other devices from that beachhead. ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules