STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AC-18 (1) — Wireless Access

CCI-001443

Definition

Protect wireless access to the system using authentication of users and/or devices.

Parent Control

AC-18 (1)Wireless AccessAccess Control

Linked STIG Checks (48)

V-268147CAT IINixOS must protect wireless access to the system using authentication of users and/or devices.Anduril NixOS Security Technical Implementation GuideV-268485CAT IIThe macOS system must disable AirDrop.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268515CAT IIThe macOS system must disable Airplay Receiver.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-268562CAT IIThe macOS system must disable Handoff.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-272477CAT IIThe macOS system must disable iPhone Mirroring.Apple macOS 15 (Sequoia) Security Technical Implementation GuideV-277092CAT IIThe macOS system must disable AirDrop.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277124CAT IIThe macOS system must disable Airplay Receiver.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277142CAT IIThe macOS system must disable iPhone Mirroring.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-277172CAT IIThe macOS system must disable Handoff.Apple macOS 26 (Tahoe) Security Technical Implementation GuideV-269441CAT IIAlmaLinux OS 9 wireless network adapters must be disabled.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-203689CAT IIThe operating system must protect wireless access to the system using authentication of users and/or devices.General Purpose Operating System Security Requirements GuideV-267447CAT IIGoogle Android 15 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Google Android 15 COBO Security Technical Implementation GuideV-267542CAT IIGoogle Android 15 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Google Android 15 COPE Security Technical Implementation GuideV-276765CAT IIGoogle Android 16 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Google Android 16 COBO Security Technical Implementation GuideV-276867CAT IIGoogle Android 16 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Google Android 16 COPE Security Technical Implementation GuideV-266559CAT IIAOS must protect wireless access to the network using authentication of users and/or devices.HPE Aruba Networking AOS Wireless Security Technical Implementation GuideV-274307CAT IIHoneywell Android 13 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Honeywell Android 13 COBO Security Technical Implementation GuideV-274402CAT IIHoneywell Android 13 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Honeywell Android 13 COPE Security Technical Implementation GuideV-272188CAT IIMotorola Solutions Android 13 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Motorola Solutions Android 13 COBO Security Technical Implementation GuideV-272334CAT IIMotorola Solutions Android 13 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Motorola Solutions Android 13 COPE Security Technical Implementation GuideV-248842CAT IIOL 8 wireless network adapters must be disabled.Oracle Linux 8 Security Technical Implementation GuideV-248843CAT IIOL 8 Bluetooth must be disabled.Oracle Linux 8 Security Technical Implementation GuideV-271449CAT IIOL 9 Bluetooth must be disabled.Oracle Linux 9 Security Technical Implementation GuideV-271859CAT IIOL 9 wireless network adapters must be disabled.Oracle Linux 9 Security Technical Implementation GuideV-281289CAT IIRHEL 10 must disable Bluetooth.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-281290CAT IIRHEL 10 must disable wireless network adapters.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-204634CAT IIThe Red Hat Enterprise Linux operating system must be configured so that all wireless network adapters are disabled.Red Hat Enterprise Linux 7 Security Technical Implementation GuideV-230507CAT IIRHEL 8 Bluetooth must be disabled.Red Hat Enterprise Linux 8 Security Technical Implementation GuideV-258039CAT IIRHEL 9 Bluetooth must be disabled.Red Hat Enterprise Linux 9 Security Technical Implementation GuideV-258040CAT IIRHEL 9 wireless network adapters must be disabled.Red Hat Enterprise Linux 9 Security Technical Implementation GuideV-261346CAT IISLEM 5 wireless network adapters must be disabled unless approved and documented.SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation GuideV-217298CAT IIThe SUSE operating system wireless network adapters must be disabled unless approved and documented.SUSE Linux Enterprise Server 12 Security Technical Implementation GuideV-72825CAT IIWireless network adapters must be disabled.SUSE Linux Enterprise Server v11 for System z Security Technical Implementation GuideV-276539CAT IISamsung Android must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Samsung Android 16 COBO Security Technical Implementation GuideV-276645CAT IISamsung Android must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Samsung Android 16 COPE Security Technical Implementation GuideV-255122CAT IISamsung Android must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Samsung Android OS 13 with Knox 3.x COBO Security Technical Implementation GuideV-255151CAT IISamsung Android must be configured to enable authentication of personal hotspot connections to the device using a pre-shared key.Samsung Android OS 13 with Knox 3.x COPE Security Technical Implementation GuideV-258641CAT IISamsung Android must be configured to enable authentication of personal hotspot connections to the device using a preshared key. - Disallow config tethering.Samsung Android OS 14 with Knox 3.x COBO Security Technical Implementation GuideV-258677CAT IISamsung Android must be configured to enable authentication of personal hotspot connections to the device using a pre-shared key.Samsung Android OS 14 with Knox 3.x COPE Security Technical Implementation GuideV-268952CAT IISamsung Android must be configured to enable authentication of personal hotspot connections to the device using a pre-shared key.Samsung Android OS 15 with Knox 3.x COBO Security Technical Implementation GuideV-269050CAT IISamsung Android must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Samsung Android OS 15 with Knox 3.x COPE Security Technical Implementation GuideV-216401CAT IIWireless network adapters must be disabled.Solaris 11 SPARC Security Technical Implementation GuideV-216164CAT IIWireless network adapters must be disabled.Solaris 11 X86 Security Technical Implementation GuideV-252956CAT IITOSS must protect wireless access to the system using authentication of users and/or devices.Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation GuideV-207438CAT IIThe VMM must protect wireless access to the system using authentication of users and/or devices.Virtual Machine Manager Security Requirements GuideV-270148CAT IIZebra Android 13 must be configured to enable authentication of personal hotspot connections to the device using a pre-shared key.Zebra Android 13 COPE Security Technical Implementation GuideV-283531CAT IIZebra Android 14 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Zebra Technologies Android 14 COBO Security Technical Implementation GuideV-283633CAT IIZebra Android 14 must be configured to enable authentication of personal hotspot connections to the device using a preshared key.Zebra Technologies Android 14 COPE Security Technical Implementation Guide