STIGhub
STIGs
RMF Controls
Compare
← All Controls
AC-18 (1)
Access Control
Rev 5
Wireless Access
CCI Identifiers (2)
CCI-001443
Protect wireless access to the system using authentication of users and/or devices.
CCI-001444
Protect wireless access to the system using encryption.
Linked STIG Checks (58)
Across 40 STIGs. Click to expand.
▶
Anduril NixOS Security Technical Implementation Guide
2 checks
▶
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
4 checks
▶
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
4 checks
▶
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
1 check
▶
General Purpose Operating System Security Requirements Guide
2 checks
▶
Google Android 15 COBO Security Technical Implementation Guide
1 check
▶
Google Android 15 COPE Security Technical Implementation Guide
1 check
▶
Google Android 16 COBO Security Technical Implementation Guide
1 check
▶
Google Android 16 COPE Security Technical Implementation Guide
1 check
▶
Honeywell Android 13 COBO Security Technical Implementation Guide
1 check
▶
Honeywell Android 13 COPE Security Technical Implementation Guide
1 check
▶
HPE Aruba Networking AOS Wireless Security Technical Implementation Guide
3 checks
▶
Motorola Solutions Android 13 COBO Security Technical Implementation Guide
1 check
▶
Motorola Solutions Android 13 COPE Security Technical Implementation Guide
1 check
▶
Network WLAN AP-NIPR Platform Security Technical Implementation Guide
2 checks
▶
Network WLAN Controller Platform Security Technical Implementation Guide
2 checks
▶
Oracle Linux 8 Security Technical Implementation Guide
2 checks
▶
Oracle Linux 9 Security Technical Implementation Guide
2 checks
▶
Red Hat Enterprise Linux 10 Security Technical Implementation Guide
2 checks
▶
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
1 check
▶
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
2 checks
▶
Red Hat Enterprise Linux 9 Security Technical Implementation Guide
2 checks
▶
Samsung Android 16 COBO Security Technical Implementation Guide
1 check
▶
Samsung Android 16 COPE Security Technical Implementation Guide
1 check
▶
Samsung Android OS 13 with Knox 3.x COBO Security Technical Implementation Guide
1 check
▶
Samsung Android OS 13 with Knox 3.x COPE Security Technical Implementation Guide
1 check
▶
Samsung Android OS 14 with Knox 3.x COBO Security Technical Implementation Guide
1 check
▶
Samsung Android OS 14 with Knox 3.x COPE Security Technical Implementation Guide
1 check
▶
Samsung Android OS 15 with Knox 3.x COBO Security Technical Implementation Guide
1 check
▶
Samsung Android OS 15 with Knox 3.x COPE Security Technical Implementation Guide
1 check
▶
Solaris 11 SPARC Security Technical Implementation Guide
1 check
▶
Solaris 11 X86 Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
1 check
▶
Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide
1 check
▶
Virtual Machine Manager Security Requirements Guide
2 checks
▶
Zebra Android 13 COPE Security Technical Implementation Guide
1 check
▶
Zebra Technologies Android 14 COBO Security Technical Implementation Guide
1 check
▶
Zebra Technologies Android 14 COPE Security Technical Implementation Guide
1 check