Skip to content
Catalogs
XCCDF
Traditional Security Checklist
IA-11.02.01
Information Assurance - Unauthorized Wireless Devices - Portable Electronic Devices (PEDs) Used in Classified Processing Areas without Certified TEMPEST Technical Authority (CTTA) Review and Authorizing Official (AO) Approval.
Information Assurance - Unauthorized Wireless Devices - Portable Electronic Devices (PEDs) Used in Classified Processing Areas without Certified TEMPEST Technical Authority (CTTA) Review and Authorizing Official (AO) Approval. An XCCDF Rule
Information Assurance - Unauthorized Wireless Devices - Portable Electronic Devices (PEDs) Used in Classified Processing Areas without Certified TEMPEST Technical Authority (CTTA) Review and Authorizing Official (AO) Approval.
Medium Severity
<VulnDiscussion>Allowing wireless devices in the vicinity of classified processing or discussion could directly result in the loss or compromise of classified or sensitive information either intentionally or accidentally.
REFERENCES:
CJCSI 6510.01F, INFORMATION ASSURANCE (IA) AND SUPPORT TO COMPUTER NETWORK DEFENSE (CND), Encl C, paragraphs 21.i(3). and 22.
CNSS Directive No. 510, 20 November 2017, Directive on the Use of Mobile Devices Within Secure Spaces
NIST Special Publication 800-53 (SP 800-53), Rev 4, Controls:
AC-18, AC-18(1), AC-18(2), AC-18(3), AC-18(4) and AC-19
CNSSP No.29, May 2013, National Secret Enclave Connection Policy
CNSSP No. 17, January 2014, Policy on Wireless Systems
DISN Connection Process Guide:
http://disa.mil/network-services/enterprise-connections/connection-process-guide
Wireless STIG
Mobility Policy Manual STIG
DoDD 8100.02, Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense (DoD) Global Information Grid (GIG), paragraphs 4.2. and 4.3
CNSSI 1400, National Instruction on the use of Mobile Devices within Secure Spaces
Joint USD(I) and DoD CIO Memorandum, dated 25, Sep 2015, SUBJECT: Security and Operational Guidance for Classified Portable Electronic Devices</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>