acceptedBlackBerry PlayBook Security Technical Implementation GuideContains the technical security requirements for the BlackBerry Playbook Tablet OS version 1.x when used in the DoD environment.DISA, Field Security OperationsSTIG.DOD.MILRelease: 1 Benchmark Date: 30 Jan 20121I - Mission Critical Public<ProfileDescription></ProfileDescription>I - Mission Critical Sensitive<ProfileDescription></ProfileDescription>I - Mission Critical Classified<ProfileDescription></ProfileDescription>II - Mission Support Public<ProfileDescription></ProfileDescription>II - Mission Support Sensitive<ProfileDescription></ProfileDescription>II - Mission Support Classified<ProfileDescription></ProfileDescription>III - Administrative Public<ProfileDescription></ProfileDescription>III - Administrative Sensitive<ProfileDescription></ProfileDescription>III - Administrative Classified<ProfileDescription></ProfileDescription>Mobile operating system apps approved<GroupDescription></GroupDescription>WIR-MOS-NS-006-01All non-core applications on mobile devices must be approved by the DAA or Command IT Configuration Control Board. <VulnDiscussion>Non-approved applications can contain malware. Approved applications should be reviewed and tested by the approving authority to ensure they do not contain malware, spyware, or have unexpected features (e.g., send private information to a web site, track user actions, connect to a non-DoD management server). The DAA or Command IT Configuration Control Board (CCB) is responsible for setting up procedures to review, test, and approve smartphone applications. It is expected the process will be similar to what is used to approve and manage applications on command PCs.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SecurityOverrideGuidance></SecurityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information Assurance Officer</Responsibility><IAControls>DCCB-1, ECWN-1</IAControls>Have DAA or Command IT CCB review and approve all non-core applications on mobile OS devices. Detailed Requirements:
Core applications are applications included in the mobile operating system by the operating system vendor. A list of core applications is usually in the STIG overview document or the STIG Configuration Tables document. All non-core applications on the mobile device must be approved by the DAA or the Command IT CCB. Approval must be documented in some type of approval (memo, letter, etc.). Non-core applications include applications added to the device by the carrier (AT&T or Verizon Wireless map application).
Check Procedures:
First, review the procedures the site or command uses to review and approve third-party applications used on site managed mobile devices. Have the IAO or DAA representative provide a copy of the application review.
Second, select 2-3 random devices managed by the site to review.
-Make a list of non-core applications on each device. Look in the smartphone memory and on the SD card.
--Have the user log into the device and show the list of applications installed on the device and the media card (procedure will vary, depending on mobile OS).
--Verify the site has written approval to use the app from the DAA or Command IT CCB.
-Mark as a finding if any app has not been approved.
Require device unlock password/passcode<GroupDescription></GroupDescription>WIR-MOS-NS-010Smartphones must be configured to require a password/passcode for device unlock.<VulnDiscussion>Sensitive DoD data could be compromised if a device unlock password/passcode is not set up on DoD smartphones.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SecurityOverrideGuidance></SecurityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System Administrator</Responsibility><IAControls>ECWN-1, IAIA-1</IAControls>Configure the smartphone to require a passcode for device unlock.This check applies to any mobile device (smartphones, tablets, etc.).
Check a sample of 2-3 devices managed by the site to verify a device unlock password/passcode has been enabled on the device. The exact procedure will vary, depending on the OS.
Have the user show that a device unlock password/passcode has been enabled on the device.
Mark as a finding if configuration is not set as required.
Smartphone inactivity timeout<GroupDescription></GroupDescription>WIR-MOS-NS-016 The smartphone inactivity timeout must be set.<VulnDiscussion>Sensitive DoD data could be compromised if the smartphone does not automatically lock after the required period of inactivity.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SecurityOverrideGuidance></SecurityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System Administrator</Responsibility><IAControls>PESL-1</IAControls>Set the smartphone inactivity timeout to required value. This check applies to any mobile OS device (smartphones, tablets, etc.).
Check a sample of 2-3 devices managed by the site to verify a device inactivity timeout has been set to 60 minutes or less (15 minutes is recommended). The exact procedure will vary, depending on the mobile OS.
Have the user show that a device inactivity timeout has been set to 60 minutes or less.
Mark as a finding if configuration is not set as required.
Minimum password/passcode length<GroupDescription></GroupDescription>WIR-MOS-NS-011The device minimum password/passcode length must be set. <VulnDiscussion>Sensitive DoD data could be compromised if a device unlock password/passcode is not set to required length on DoD smartphones. </VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SecurityOverrideGuidance></SecurityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System Administrator</Responsibility><IAControls>ECWN-1, IAIA-1</IAControls>Set the smartphone minimum password/passcode length as required. This check applies to any mobile OS device (smartphones, tablets, etc.).
Check a sample of 2-3 devices managed by the site to verify the device unlock password/passcode has been set to 8 or more alphanumeric characters. The exact procedure will vary, depending on the mobile OS.
Have the user show that a device unlock password/passcode has been set to 8 or more alphanumeric characters.
Mark as a finding if configuration is not set as required.
Use of personally owned applications<GroupDescription></GroupDescription>WIR-MOS-NS-050-01 The installation of user owned applications on the mobile device must be based on the Command’s Mobile Device Personal Use Policy.<VulnDiscussion>The risk of installing personally owned or freeware apps on a DoD mobile device should be evaluated by the DAA against mission need and how the device is intended to be used. There is a risk that personally owned or freeware apps could introduce malware on the device, which could impact the performance of the device and corrupt non-sensitive data stored on the device.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SecurityOverrideGuidance></SecurityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information Assurance Officer</Responsibility><IAControls>ECWN-1</IAControls>Remove unauthorized applications.Check a sample (2-3) of mobile devices managed at the site authorized to connect to a DoD network or store or process sensitive or classified DoD information. Review the Command’s Mobile Device Personal Use policy.
Determine if any personally owned apps are installed on the mobile device, including the SD media card. The exact procedure will vary, depending on the OS. If personally owned apps are found, determine if these apps are authorized by the Command’s Mobile Device Personal Use Policy.
Mark as a finding if unauthorized personal apps are found on site managed devices. This check is not applicable if the Command’s Mobile Device Personal Use Policy allows the installation of user owned applications.
Use of personal email<GroupDescription></GroupDescription>WIR-MOS-NS-050-02 The use of the mobile device to view and/or download personal email must be based on the Command’s Mobile Device Personal Use Policy.<VulnDiscussion>The risk of viewing and downloading personal email on a non-DoD-network connected mobile device that does not contain sensitive or classified DoD data/information should be evaluated by the DAA against mission need and how the device is intended to be used. There is a risk that personal email could introduce malware on the device, which could impact the performance of the device and corrupt non-sensitive data stored on the device.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SecurityOverrideGuidance></SecurityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information Assurance Officer</Responsibility><IAControls>ECWN-1</IAControls>Train users to not view or download personal email unless authorized by the Command’s Mobile Device Personal Use Policy. Check a sample (2-3) of mobile devices managed at the site authorized to connect to a DoD network or store or process sensitive or classified DoD information. Review the Command’s Mobile Device Personal Use Policy.
Determine if devices are being used to view personal email or store personal email messages. The exact procedure will vary, depending on the mobile OS. If personal email is being viewed or downloaded, determine if this use of the device is authorized by the Command’s Mobile Device Personal Use Policy.
Mark as a finding if unauthorized personal email is being viewed or downloaded on site managed devices. This check is not applicable if the Command’s Mobile Device Personal Use Policy allows viewing and/or download of personal email.
Use of personally owned data<GroupDescription></GroupDescription>WIR-MOS-NS-050-03 Download of user owned data (music files, picture files, etc.) on mobile devices must be based on the Command’s Mobile Device Personal Use Policy.<VulnDiscussion>The risk of installing user owned data (music files, picture files, etc.) on a non-DoD-network connected mobile device that does not contain sensitive or classified DoD data/information should be evaluated by the DAA against mission need and how the device is intended to be used. There is a risk that user owned data (music files, picture files, etc.) could introduce malware on the device, which could impact the performance of the device and corrupt non-sensitive data stored on the device.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SecurityOverrideGuidance></SecurityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information Assurance Officer</Responsibility><IAControls>ECWN-1</IAControls>Do not install personal data files on the mobile device unless authorized by the Command’s Mobile Device Personal Use Policy. Check a sample (2-3) of mobile devices managed at the site authorized to connect to a DoD network or store or process sensitive or classified DoD information.
Review the Command’s Mobile Device Personal Use Policy.
Determine if any user owned data (music files, picture files, etc.) are installed on the mobile device, including the SD media card. The exact procedure will vary, depending on the mobile OS.
If user owned data (music files, picture files, etc.) are found, determine if these apps are authorized by the Command’s Mobile Device Personal Use Policy.
Mark as a finding if unauthorized user owned data (music files, picture files, etc.) are found on site managed devices. This check is not applicable if the Command’s Mobile Device Personal Use Policy allows the download of personal data files.
Use of personal social media accounts<GroupDescription></GroupDescription>WIR-MOS-NS-050-04 Connecting mobile devices to user social media web accounts (Facebook, Twitter, etc.) must be based on the Command’s Mobile Device Personal Use Policy.<VulnDiscussion>The risk of connecting to user social media web accounts on a non-DoD-network connected mobile device that does not contain sensitive or classified DoD data/information should be evaluated by the DAA against mission need and how the device is intended to be used. There is a risk that connecting to user social media web accounts could introduce malware on the device, which could impact the performance of the device and corrupt non-sensitive data stored on the device.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SecurityOverrideGuidance></SecurityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>Information Assurance Officer</Responsibility><IAControls>ECWN-1</IAControls>Train user to not connect to unauthorized social media web sites unless authorized by the Command’s Mobile Device Personal Use Policy. Check a sample (2-3) of mobile devices managed at the site and are not authorized to connect to a DoD network or store or process sensitive or classified DoD information.
Review the Command’s Mobile Device Personal Use Policy.
Determine if the mobile device is being used to connect to user social media web accounts. Look for social media icons on the device and talk to the user. The exact procedure will vary, depending on the mobile OS.
If the device is being used to connect to user social media accounts, determine if these applications are authorized by the Command’s Mobile Device Personal Use Policy.
Mark as a finding if the device is being used to connect to unauthorized user social media accounts. This check is not applicable if the Command’s Mobile Device Personal Use Policy allows connecting to user social media web accounts.
BlackBerry Playbook Tablet OS version<GroupDescription></GroupDescription>WIR1100-01The installed version of the BlackBerry Playbook tablet operation system must be the latest version of OS 1.x.<VulnDiscussion>Required security features are not available in earlier OS versions. In addition, BlackBerry Playbook tablet OS 2.x may not be used until a STIG update has been released covering that version. New STIG checks are required to adequately secure new features expected in the OS 2.x release, otherwise sensitive DoD information may be compromised.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SecurityOverrideGuidance></SecurityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility>System Administrator</Responsibility><IAControls>ECWN-1</IAControls>Install the latest version of BlackBerry Playbook tablet OS 1.x. Select a sample of site managed Playbook tablets to review (2-3 devices selected at random).
Determine the installed OS version number as follows:
-Have the user log into the Playbook tablet.
-Navigate to the OS version number: Settings > About
Mark as a finding if the required OS version is not installed.