Skip to content

WLAN EAP-TLS implementation must use certificate-based PKI authentication to connect to DoD networks.

An XCCDF Rule

Description

DoD certificate-based PKI authentication is strong, two-factor authentication that relies on carefully evaluated cryptographic modules. Implementations of EAP-TLS that are not integrated with certificate-based PKI could have security vulnerabilities. For example, an implementation that uses a client certificate on laptop without a second factor could enable an adversary with access to the laptop to connect to the WLAN without a PIN or password. Systems that do not use the certificate-based PKI are also much more likely to be vulnerable to weaknesses in the underlying public key infrastructure (PKI) that supports EAP-TLS. Certificate-based PKI authentication must be used to connect WLAN client devices to DoD networks. The certificate-based PKI authentication should directly support the WLAN EAP-TLS implementation. At least one layer of user authentication must enforce network authentication requirements (e.g., CAC authentication) before the user is able to access DoD information resources.

ID
SV-243222r720121_rule
Version
WLAN-NW-000700
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Integrate certificate-based PKI authentication into the WLAN authentication process.