UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

BES Bluetooth controls must be compliant with requirements. IT Policy rule “Disable Wireless Bypass” (Bluetooth Only policy group) must be set as required.


Overview

Finding ID Version Rule ID IA Controls Severity
V-19265 WIR1405-10 SV-21181r3_rule ECSC-1 Medium
Description
Bluetooth usage could provide an attack vector for a hacker to connect to a BlackBerry device without the knowledge of the user. DoD data would then be vulnerable.
STIG Date
BlackBerry Enterprise Server (version 5.x), Part 3 Security Technical Implementation Guide 2013-09-30

Details

Check Text ( C-23300r4_chk )
Detailed Policy Requirements:

See Check WIR1405-01 (V0014198) for detailed policy requirements.

*****For this check, set IT Policy rule “Disable Wireless Bypass” (Bluetooth policy group) to “Yes”.

Check Procedures:

This is a BES IT Policy check. Recommend all checks related to BES IT policies be reviewed using the procedure in Check WIR1400-01 (V0003545).

*****Verify IT Policy rule “Disable Wireless Bypass” (Bluetooth policy group) is set as required.

Mark as a finding if not set as required.
Fix Text (F-23386r4_fix)
Configure the IT Policy rule as specified in the "Checks" block.