UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

BES IT Policy rule must be configured as required. IT Policy rule “Content Protection Usage” (Security policy group) must be set as required.


Overview

Finding ID Version Rule ID IA Controls Severity
V-25878 WIR1445-04 SV-32233r2_rule ECSC-1 Medium
Description
DoD 8500 policy requires data-at-rest protection be enabled on all IT devices containing sensitive data in case the device is lost or stolen. This protection normally involves password or pin protected access.
STIG Date
BlackBerry Enterprise Server, Part 3 Security Technical Implementation Guide 2012-10-01

Details

Check Text ( C-32699r2_chk )
For this check, set IT Policy rule “Content Protection Usage” (Security policy group) to “Allowed”.

Check Procedures:
This is a BES IT Policy check. Recommend all checks related to BES IT policies be reviewed
using the procedure in Check WIR1400-01 (V0003545).

*****Verify IT Policy rule “Content Protection Usage” (Security policy group) is set as required.
Fix Text (F-23386r1_fix)
Configure the IT Policy rule as specified in the "Checks" block.