The VMM must protect wireless access to the system using authentication of users and/or devices.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
|---|---|---|---|---|---|---|
| medium | V-207438 | SRG-OS-000300 | SRG-OS-000300-VMM-001070 | SV-207438r958678_rule | 2024-12-06 | 2 |
| Description |
|---|
| Allowing devices and users to connect to the system without first authenticating them allows untrusted access and can lead to a compromise or attack. Wireless technologies include, for example, microwave, packet radio (UHF/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP/TLS, PEAP), which provide credential protection and mutual authentication. This requirement applies to those VMMs that control wireless devices. |
| ℹ️ Check |
|---|
| Verify the VMM protects wireless access to the system using authentication of users and/or devices. If it does not, this is a finding. |
| ✔️ Fix |
|---|
| Configure the VMM to protect wireless access to the system using authentication of users and/or devices. |