Remote-access Guide

remote access policy stig

by Mr. Michale Haag I Published 2 years ago Updated 2 years ago
image

Standards outlining cybersecurity methodologies for remote access are written in the Remote Access Policy STIG (Security Technical Implementation Guide). DISA’s (Defense Systems Information Agency) Layer 2 Switch STIG clearly mandates the requirement of enabling 802.1x authentication.

Full Answer

Why did Disa change the Stig and SRG IDs?

To provide increased flexibility for the future, DISA has updated the systems that produce STIGs and SRGs. This has resulted in a modification to Group and Rule IDs (Vul and Subvul IDs).

How do I contact the DISA Stig Customer Support Desk?

For all questions related to STIG content, please contact the DISA STIG Customer Support Desk at disa.stig_spt@mail.mil.

Are Stigs now being published with modified content?

New and updated STIGs are now being published with the modified content. New releases of STIGs published prior to this change will include the “legacy” Group and Rule IDs as XCCDF ident elements. For all questions related to STIG content, please contact the DISA STIG Customer Support Desk at disa.stig_spt@mail.mil.

image

What is medium wireless?

Medium. The organization must authorize wireless access to the information system prior to connection. Wireless technologies include, but are not limited to, microwave, satellite, packet radio (UHF/VHF), Wi-Fi, and Bluetooth. Wireless networks present similar security risks to those of a wired ...

What are the technologies that are considered wireless?

Wireless technologies include, but are not limited to, microwave, satellite, packet radio (UHF/VHF), Wi-Fi, and Bluetooth. Wireless networks present similar security risks to those of a wired ...

What are the wireless technologies?

Wireless technologies include, but are not limited to, microwave, satellite, packet radio (UHF/VHF), Wi-Fi, and Bluetooth. Wireless networks present similar security risks to those of a wired ... V-35922. Medium.

What is a V-35958?

High. The organization must have a policy forbidding the use of wireless personal area network (PAN) devices, such as near-field communications (NFC), Bluetooth, and ZigBee, to send, receive, store, or process classified information.

What is SRG in security?

The Mobile Policy Security Requirements Guide (SRG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents.

Do CMDs have cameras?

CMDs with cameras are easily used to photograph sensitive information and areas if not addressed. Sites must establish, document, and train on how to mitigate this threat.

Can CMDs be used to receive classified messages?

The organization must have written policy or training material stating CMDs must not be used to receive, transmit, or process classified messages unless specifically approved by NSA for such purposes and NSA-approved transmission and storage methods are used.

image
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9