Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-19264 | WIR1405-09 | SV-21180r2_rule | ECSC-1 | Low |
Description |
---|
Bluetooth usage could provide an attack vector for a hacker to connect to a BlackBerry device without the knowledge of the user. DoD data would then be vulnerable. |
STIG | Date |
---|---|
BlackBerry Enterprise Server (version 5.x), Part 3 Security Technical Implementation Guide | 2013-06-21 |
Check Text ( C-23299r2_chk ) |
---|
Detailed Policy Requirements: See Check WIR1405-01 (V0014198) for detailed policy requirements. *****For this check, set IT Policy rule “Disable Desktop Connectivity” (Bluetooth policy group) to “Yes" or “No", depending on if the Bluetooth Smart Card Reader (SCR) is used at the site. Check Procedures: This is a BES IT Policy check. Recommend all checks related to BES IT policies be reviewed using the procedure in Check WIR1400-01 (V0003545). *****Verify IT Policy rule “Disable Desktop Connectivity” (Bluetooth policy group) is set as required. |
Fix Text (F-23386r2_fix) |
---|
Configure the IT Policy rule Require FIPS Ciphers as specified in the "Checks" block. |