Sha256: a26b488477d064fcce366b143b317c6985f0ea79009084de9e6f5999a32d80b7
Contents?: true
Size: 1.15 KB
Versions: 2
Compression:
Stored size: 1.15 KB
Contents
{ "name": "stig_rfid_workstation", "date": "2014-03-18", "description": "This STIG contains the technical security controls for the operation of a RFID Workstation in the DoD environment.", "title": "RFID Workstation Security Technical Implementation Guide (STIG)", "version": "6", "item_syntax": "^\\w-\\d+$", "section_separator": null, "items": [ { "id": "V-14034", "title": "If a wireless connection (e.g. WLAN, Bluetooth) is used between the RFID scanner and RFID workstation, security requirements must be followed.", "description": "Sensitive data stored on the RFID scanner and transmitted to the workstation could be compromised.", "severity": "low" }, { "id": "V-18625", "title": "PDA and Smartphones that are connected to DoD Windows computers via a USB connection must be compliant with requirements.", "description": "PDAs with flash memory can introduce malware to a PC when they are connected for provisioning of the PDA or to transfer data between the PC and PDA, particularly if the PDA is seen by the PC as a mass storage device and autorun in enabled. ", "severity": "medium" } ] }
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
kriterion-0.1.0 | standards/stig_rfid_workstation.json |
kriterion-0.0.1 | standards/stig_rfid_workstation.json |