STIGhub
STIGs
RMF Controls
Compare
← AC-18 (1) — Wireless Access
CCI-001444
Definition
Protect wireless access to the system using encryption.
Parent Control
AC-18 (1)
Wireless Access
Access Control
Linked STIG Checks (24)
V-268146
CAT I
NixOS must protect wireless access to and from the system using encryption.
Anduril NixOS Security Technical Implementation Guide
V-269441
CAT II
AlmaLinux OS 9 wireless network adapters must be disabled.
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
V-203688
CAT II
The operating system must protect wireless access to and from the system using encryption.
General Purpose Operating System Security Requirements Guide
V-266559
CAT II
AOS must protect wireless access to the network using authentication of users and/or devices.
HPE Aruba Networking AOS Wireless Security Technical Implementation Guide
V-266560
CAT II
The network element must protect wireless access to the system using Federal Information Processing Standard (FIPS)-validated Advanced Encryption Standard (AES) block cipher algorithms with an approved confidentiality mode.
HPE Aruba Networking AOS Wireless Security Technical Implementation Guide
V-266703
CAT II
When AOS is used as a wireless local area network (WLAN) controller, WLAN Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) implementation must use certificate-based public key infrastructure (PKI) authentication to connect to DOD networks.
HPE Aruba Networking AOS Wireless Security Technical Implementation Guide
V-243220
CAT II
WLAN must use EAP-TLS.
Network WLAN AP-NIPR Platform Security Technical Implementation Guide
V-243222
CAT II
WLAN EAP-TLS implementation must use certificate-based PKI authentication to connect to DoD networks.
Network WLAN AP-NIPR Platform Security Technical Implementation Guide
V-243234
CAT II
WLAN must use EAP-TLS.
Network WLAN Controller Platform Security Technical Implementation Guide
V-243236
CAT II
WLAN EAP-TLS implementation must use certificate-based PKI authentication to connect to DoD networks.
Network WLAN Controller Platform Security Technical Implementation Guide
V-248842
CAT II
OL 8 wireless network adapters must be disabled.
Oracle Linux 8 Security Technical Implementation Guide
V-248843
CAT II
OL 8 Bluetooth must be disabled.
Oracle Linux 8 Security Technical Implementation Guide
V-271859
CAT II
OL 9 wireless network adapters must be disabled.
Oracle Linux 9 Security Technical Implementation Guide
V-281290
CAT II
RHEL 10 must disable wireless network adapters.
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
V-204634
CAT II
The Red Hat Enterprise Linux operating system must be configured so that all wireless network adapters are disabled.
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
V-230506
CAT II
RHEL 8 wireless network adapters must be disabled.
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
V-258040
CAT II
RHEL 9 wireless network adapters must be disabled.
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
V-261346
CAT II
SLEM 5 wireless network adapters must be disabled unless approved and documented.
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
V-217298
CAT II
The SUSE operating system wireless network adapters must be disabled unless approved and documented.
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
V-72825
CAT II
Wireless network adapters must be disabled.
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
V-216401
CAT II
Wireless network adapters must be disabled.
Solaris 11 SPARC Security Technical Implementation Guide
V-216164
CAT II
Wireless network adapters must be disabled.
Solaris 11 X86 Security Technical Implementation Guide
V-252956
CAT II
TOSS must protect wireless access to the system using authentication of users and/or devices.
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
V-207437
CAT II
The VMM must protect wireless access to the system using encryption.
Virtual Machine Manager Security Requirements Guide