Instant messaging traffic to and from instant messaging clients that are independently configured by end users and that interact with a public service provider is prohibited within DoD information systems. Both inbound and outbound public service instant messaging traffic is blocked at the enclave boundary. Note: This does not include IM services that are configured by a DoD AIS application or enclave to perform an authorized and official function.
MAC / CONF | Impact | Subject Area |
---|---|---|
MACI MACII MACIII | Medium | Enclave Computing Environment |
Threat |
---|
Uncontrolled instant messaging traffic could allow unauthorized users to gain access to the protected services. This would result in unauthorized disclosure, modification, or destruction of critical system data. This implementation guide is aimed to help network administrators implement controlled instant messaging traffic within DoD information systems. |
Guidance |
---|
1. The network administrator shall install DOD authorized instant messaging services on the system servers and workstations in support of authorized and official functions (e.g., collaboration, file transfer). 2. The network administrator shall configure the instant messaging client on user workstations not to allow users to change baseline client configuration. 3. The network administrator/telecommunications specialist shall configure the enclave boundary protection mechanisms (e.g., firewall, router) to block both inbound and outbound public service instant messaging traffic (e.g., the rule set for this service should have “DENY”) except for the instant message services that are configured by a DOD AIS application or enclave to perform authorized and official functions. 4. The project management shall ensure that system users (government employees and contractors) take regular security trainings related to the use of instant message services and privacy issues and that users follow the Rules of Behavior. |