Sha256: d13413281c2cf8001a8a5a7a9e2ad0b0eb8297a88f9523570962ce7a157e9a54
Contents?: true
Size: 919 Bytes
Versions: 2
Compression:
Stored size: 919 Bytes
Contents
{ "name": "stig_wlan_access_point_policy", "date": "2011-10-10", "description": "This STIG contains the policy, training, and operating procedure security controls for WLAN access points operated in the DoD environment.", "title": "WLAN Access Point Policy Security Technical Implementation Guide", "version": "1", "item_syntax": "^\\w-\\d+$", "section_separator": null, "items": [ { "id": "V-18596", "title": "The site will conduct continuous wireless IDS scanning. \n\nNote: This requirement applies to all DoD sites that operate DoD computer networks, including sites that have no authorized WLAN systems. \n", "description": "DoD networks are at risk and DoD data could be compromised if wireless scanning is not conducted to identify unauthorized WLAN clients and access points connected to or attempting to connect to the network.", "severity": "medium" } ] }
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
kriterion-0.1.0 | standards/stig_wlan_access_point_policy.json |
kriterion-0.0.1 | standards/stig_wlan_access_point_policy.json |