UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

BES Bluetooth controls must be compliant with requirements. IT Policy rule “Disable Message Access Profile” (Bluetooth policy group) must be set as required.


Overview

Finding ID Version Rule ID IA Controls Severity
V-25873 WIR1405-22 SV-32228r2_rule ECSC-1 Low
Description
Bluetooth usage could provide an attack vector for a hacker to connect to a BlackBerry device without the knowledge of the user. DoD data would then be vulnerable.
STIG Date
BlackBerry Enterprise Server (version 5.x), Part 3 Security Technical Implementation Guide 2013-06-21

Details

Check Text ( C-32694r2_chk )
Detailed Policy Requirements:

See Check WIR1405-01 (V0014198) for detailed policy requirements.

*****For this check, set IT Policy rule “Disable Message Access Profile” (Bluetooth policy group) to “Yes”.

Check Procedures:

This is a BES IT Policy check. Recommend all checks related to BES IT policies be reviewed using the procedure in Check WIR1400-01 (V0003545).

*****Verify IT Policy rule “Disable Message Access Profile” (Bluetooth policy group) is set as required.
Fix Text (F-23386r2_fix)
Configure the IT Policy rule Require FIPS Ciphers as specified in the "Checks" block.