Review a sample of site managed devices (3-4), interview the IAO, and review product documentation.
Note: iOS does not currently meet this requirement but a third-party application could be used to meet the requirement. Verify one or more third-party applications (security container app, email app, etc.) are used that meet this requirement.
Verify the site uses a security container application to store all data saved to the device and the container is FIPS 140-2 validated. This includes all data generated by applications on the device and all data downloaded from the browser or VPN client (if used). In most cases, the browser and VPN client will have to be installed inside the security container or integrated with the container in some way for this to occur. Review system documentation to identify the FIPS 140-2 certificate for the cryptographic module. Visit the NIST web site http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm to verify the certificate is still valid. If the module is not currently FIPS validated, this is a finding. Note, additional requirements for the security container will be reviewed during the review of the MDM server (check V-32747/WIR-WMS-MDM-02).
Determine how the site has ensured all data generated by applications or downloaded from the browser or VPN client is stored in the security container application.
Mark as a finding if all DoD data stored on site managed devices is not saved inside a security container that is FIPS 140-2 validated. |