UCF STIG Viewer Logo

BlackBerry Playbook OS (NEA mode) Security Technical Implementation Guide (STIG)


Overview

Date Finding Count (10)
2013-03-14 CAT I (High): 2 CAT II (Med): 0 CAT III (Low): 8
STIG Description
This document describes required technical IA controls for the Playbook when used in the Non-Enterprise Activated (NEA mode). NEA mode is when the device is not connected to the DoD network and does not process sensitive DoD data or email.

Available Profiles



Findings (MAC II - Mission Support Classified)

Finding ID Severity Title
V-34012 High Multiple Adobe Products Code Signing Certificate Revocation
V-36792 High Multiple Vulnerabilities in Adobe Flash Player and AIR
V-25007 Low Smartphones must be configured to require a password/passcode for device unlock.
V-25016 Low The device minimum password/passcode length must be set.
V-24986 Low All non-core applications on mobile devices must be approved by the DAA or Command IT Configuration Control Board.
V-25010 Low The smartphone inactivity timeout must be set.
V-30418 Low Download of user owned data (music files, picture files, etc.) on mobile devices must be based on the Command’s Mobile Device Personal Use Policy.
V-30419 Low Connecting mobile devices to user social media web accounts (Facebook, Twitter, etc.) must be based on the Command’s Mobile Device Personal Use Policy.
V-30412 Low The installation of user owned applications on the mobile device must be based on the Command’s Mobile Device Personal Use Policy.
V-30417 Low The use of the mobile device to view and/or download personal email must be based on the Command’s Mobile Device Personal Use Policy.