STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AC-18 (1) — Wireless Access

CCI-001444

Definition

Protect wireless access to the system using encryption.

Parent Control

AC-18 (1)Wireless AccessAccess Control

Linked STIG Checks (24)

V-268146CAT INixOS must protect wireless access to and from the system using encryption.Anduril NixOS Security Technical Implementation GuideV-269441CAT IIAlmaLinux OS 9 wireless network adapters must be disabled.Cloud Linux AlmaLinux OS 9 Security Technical Implementation GuideV-203688CAT IIThe operating system must protect wireless access to and from the system using encryption.General Purpose Operating System Security Requirements GuideV-266559CAT IIAOS must protect wireless access to the network using authentication of users and/or devices.HPE Aruba Networking AOS Wireless Security Technical Implementation GuideV-266560CAT IIThe network element must protect wireless access to the system using Federal Information Processing Standard (FIPS)-validated Advanced Encryption Standard (AES) block cipher algorithms with an approved confidentiality mode.HPE Aruba Networking AOS Wireless Security Technical Implementation GuideV-266703CAT IIWhen AOS is used as a wireless local area network (WLAN) controller, WLAN Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) implementation must use certificate-based public key infrastructure (PKI) authentication to connect to DOD networks.HPE Aruba Networking AOS Wireless Security Technical Implementation GuideV-243220CAT IIWLAN must use EAP-TLS.Network WLAN AP-NIPR Platform Security Technical Implementation GuideV-243222CAT IIWLAN EAP-TLS implementation must use certificate-based PKI authentication to connect to DoD networks.Network WLAN AP-NIPR Platform Security Technical Implementation GuideV-243234CAT IIWLAN must use EAP-TLS.Network WLAN Controller Platform Security Technical Implementation GuideV-243236CAT IIWLAN EAP-TLS implementation must use certificate-based PKI authentication to connect to DoD networks.Network WLAN Controller Platform Security Technical Implementation GuideV-248842CAT IIOL 8 wireless network adapters must be disabled.Oracle Linux 8 Security Technical Implementation GuideV-248843CAT IIOL 8 Bluetooth must be disabled.Oracle Linux 8 Security Technical Implementation GuideV-271859CAT IIOL 9 wireless network adapters must be disabled.Oracle Linux 9 Security Technical Implementation GuideV-281290CAT IIRHEL 10 must disable wireless network adapters.Red Hat Enterprise Linux 10 Security Technical Implementation GuideV-204634CAT IIThe Red Hat Enterprise Linux operating system must be configured so that all wireless network adapters are disabled.Red Hat Enterprise Linux 7 Security Technical Implementation GuideV-230506CAT IIRHEL 8 wireless network adapters must be disabled.Red Hat Enterprise Linux 8 Security Technical Implementation GuideV-258040CAT IIRHEL 9 wireless network adapters must be disabled.Red Hat Enterprise Linux 9 Security Technical Implementation GuideV-261346CAT IISLEM 5 wireless network adapters must be disabled unless approved and documented.SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation GuideV-217298CAT IIThe SUSE operating system wireless network adapters must be disabled unless approved and documented.SUSE Linux Enterprise Server 12 Security Technical Implementation GuideV-72825CAT IIWireless network adapters must be disabled.SUSE Linux Enterprise Server v11 for System z Security Technical Implementation GuideV-216401CAT IIWireless network adapters must be disabled.Solaris 11 SPARC Security Technical Implementation GuideV-216164CAT IIWireless network adapters must be disabled.Solaris 11 X86 Security Technical Implementation GuideV-252956CAT IITOSS must protect wireless access to the system using authentication of users and/or devices.Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation GuideV-207437CAT IIThe VMM must protect wireless access to the system using encryption.Virtual Machine Manager Security Requirements Guide