Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000512

    Group
  • WLAN SSIDs must be changed from the manufacturer's default to a pseudo random word that does not identify the unit, base, organization, etc.

    An SSID identifying the unit, site, or purpose of the WLAN or that is set to the manufacturer default may cause an OPSEC vulnerability.
    Rule Low Severity
  • SRG-NET-000514

    Group
  • The WLAN inactive/idle session timeout must be set for 30 minutes or less.

    A WLAN session that never terminates due to inactivity may allow an opening for an adversary to highjack the session to obtain access to the network.
    Rule Medium Severity
  • SRG-NET-000063

    Group
  • WLAN components must be Wi-Fi Alliance certified with WPA2 or WPA3.

    Wi-Fi Alliance certification ensures compliance with DoD interoperability requirements between various WLAN products.
    Rule Medium Severity
  • SRG-NET-000070

    Group
  • WLAN must use EAP-TLS.

    EAP-TLS provides strong cryptographic mutual authentication and key distribution services not found in other EAP methods, and thus provides significantly more protection against attacks than other ...
    Rule Medium Severity
  • SRG-NET-000151

    Group
  • WLAN components must be FIPS 140-2 or FIPS 140-3 certified and configured to operate in FIPS mode.

    If the DoD WLAN components (WLAN AP, controller, or client) are not NIST FIPS 140-2/FIPS 140-3 (Cryptographic Module Validation Program, CMVP) certified, the WLAN system may not adequately protect ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules