UCF STIG Viewer Logo

The Bluetooth protocol driver must be removed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-51439 OSX8-00-00065 SV-65649r1_rule Low
Description
Wireless access introduces security risks which must be addressed through implementation of strict controls and procedures such as authentication, encryption, and defining what resources that can be accessed. The organization will define the requirements for connection of mobile devices. In order to ensure that the connection provides adequate integrity and confidentiality of the connection, the operating system must enforce these requirements.
STIG Date
Apple OS X 10.8 (Mountain Lion) Workstation STIG 2015-02-10

Details

Check Text ( C-53775r1_chk )
To check if there are any hardware components for Bluetooth loaded in the system, run the following command:

sudo kextstat | grep -i bluetooth

If there is a result, this is a finding.
Fix Text (F-56237r1_fix)
Removing the kernel extensions for Bluetooth will remove the system's ability to load Bluetooth devices, use the following commands to remove them:

sudo rm -Rf /System/Library/Extensions/IOBluetoothFamily.kext; sudo rm -Rf /System/Library/Extensions/IOBluetoothHIDDDriver.kext; sudo touch /System/Library/Extensions