UCF STIG Viewer Logo

Security configuration settings on the BlackBerry devices managed by the site must be compliant with requirements listed in Table 5, BlackBerry STIG Configuration Tables.


Overview

Finding ID Version Rule ID IA Controls Severity
V-19227 WIR1080-01 SV-21127r2_rule ECWN-1 Low
Description
These checks are related to a defense-in-depth approach for the BlackBerry, including ensuring the locked BlackBerry is not identified as a DoD BlackBerry and providing visual indicators when the Bluetooth radio is being used so users can verify they have initiated a Bluetooth connection attempt or if a hacker has initiated the connection.
STIG Date
BlackBerry OS 7.x Security Technical Implementation Guide 2015-07-02

Details

Check Text ( C-23179r2_chk )
Verify the BlackBerry administrator has used the configuration settings list in Table 5, BlackBerry STIG Configuration Tables and check the following settings:

-Device Name (this is checked in two locations)
-Reader LED – Low Battery
-Reader LED – Pairing
-Reader LED – Traffic

A sample of BlackBerry devices should be checked (use 2-3 devices as a random sample). Table 5, BlackBerry STIG Configuration Tables contains instructions on how to verify correct settings on a BlackBerry.
Fix Text (F-23352r1_fix)
Security configuration settings on the BlackBerry devices managed by the site are compliant with requirements listed in Table 1, BlackBerry STIG Configuration Tables.