UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

BES Bluetooth controls must be compliant with requirements. IT Policy rule “Minimum Encryption Key Length” (Bluetooth Only policy group) must be set as required.


Overview

Finding ID Version Rule ID IA Controls Severity
V-26507 WIR1405-23 SV-33353r2_rule ECSC-1 Medium
Description
Bluetooth usage could provide an attack vector for a hacker to connect to a BlackBerry device without the knowledge of the user. DoD data would then be vulnerable.
STIG Date
BlackBerry Enterprise Server, Part 3 Security Technical Implementation Guide 2012-10-01

Details

Check Text ( C-33856r2_chk )
Detailed Policy Requirements:

See Check WIR1405-01 (V0014198) for detailed policy requirements and check procedures.

*****For this check, set IT Policy rule “Minimum Encryption Key Length” (Bluetooth policy group) to either “ " or “16” for STIG IT Policies for no Bluetooth headsets or to “16” for STIG IT Policies for Bluetooth headsets.

Check Procedures:

This is a BES IT Policy check. Recommend all checks related to BES IT policies be reviewed using the procedure in Check WIR1400-01 (V0003545).

*****Verify IT Policy rule “Minimum Encryption Key Length” (Bluetooth policy group) is set as required.
Fix Text (F-23386r1_fix)
Configure the IT Policy rule as specified in the "Checks" block.