acceptedBlackBerry PlayBook OS V2.1 Security Technical Implementation GuideDeveloped by BlackBerry Ltd. in coordination with DISA for use in the DoD. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil.DISA, Field Security OperationsSTIG.DOD.MILRelease: 2 Benchmark Date: 24 Oct 20141I - Mission Critical Classified<ProfileDescription></ProfileDescription>I - Mission Critical Public<ProfileDescription></ProfileDescription>I - Mission Critical Sensitive<ProfileDescription></ProfileDescription>II - Mission Support Classified<ProfileDescription></ProfileDescription>II - Mission Support Public<ProfileDescription></ProfileDescription>II - Mission Support Sensitive<ProfileDescription></ProfileDescription>III - Administrative Classified<ProfileDescription></ProfileDescription>III - Administrative Public<ProfileDescription></ProfileDescription>III - Administrative Sensitive<ProfileDescription></ProfileDescription>SRG-OS-000028-MOS-000008<GroupDescription></GroupDescription>PB21-00-000100BlackBerry PlayBook OS must retain the lock work space until the user reestablishes access using established identification and authentication procedures.<VulnDiscussion>The device lock function prevents further access to the system by initiating a session lock after a period of inactivity or upon receiving a request from a user. The device lock is retained until the user reestablishes access using established identification and authentication procedures.
A device lock is a temporary action taken when a user stops work but does not want to log out because of the temporary nature of the hiatus. During the device lock a publicly viewable pattern is visible on the associated display, hiding what was previously visible on the screen. Once invoked, the device lock shall remain in place until the user re-authenticates. No other system activity aside from re-authentication can unlock the system.
The operating system must enforce a device lock function. This prevents others from gaining access to the device when not in the user's possession and accessing sensitive DoD information. The identification and authentication procedure configuration must be set by a Mobile Device Management (MDM) service and be sufficiently complex to protect sensitive data.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000056On BlackBerry Device Service, set "Password Required for Work Space" IT Policy rule to "Yes".Navigate to "Options -> BlackBerry Balance" and select the Pencil icon. Ensure "Remove Password" button exists and is greyed out. Otherwise, this is a finding.SRG-OS-000028-MOS-000008<GroupDescription></GroupDescription>PB21-00-000110BlackBerry PlayBook OS must retain the device lock until the user reestablishes access using established identification and authentication procedures.<VulnDiscussion>The device lock function prevents further access to the system by initiating a session lock after a period of inactivity or upon receiving a request from a user. The device lock is retained until the user reestablishes access using established identification and authentication procedures.
A device lock is a temporary action taken when a user stops work but does not want to log out because of the temporary nature of the hiatus. During the device lock a publicly viewable pattern is visible on the associated display, hiding what was previously visible on the screen. Once invoked, the device lock shall remain in place until the user re-authenticates. No other system activity aside from re-authentication can unlock the system.
The operating system must enforce a device lock function. This prevents others from gaining access to the device when not in the user's possession and accessing sensitive DoD information. The identification and authentication procedure configuration must be set by a Mobile Device Management (MDM) service and be sufficiently complex to protect sensitive data.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000056Navigate to "Options -> Security ->Password" and set "Enable Password" is set to "ON". Create a 4 digit passcode for the device lock.Navigate to "Options -> Security ->Password" and ensure "Enable Password" is set to "ON". Otherwise, this is a finding.SRG-OS-000029-MOS-000009<GroupDescription></GroupDescription>PB21-00-000120BlackBerry PlayBook OS must lock the device after no more than 15 minutes of inactivity.<VulnDiscussion>The device lock function prevents further access to the system by initiating a session lock after a period of inactivity or upon receiving a request from a user. The device lock is retained until the user reestablishes access using established identification and authentication procedures.
A device lock is a temporary action taken when a user stops work but does not want to shut down because of the temporary nature of the hiatus. During the device lock a publicly viewable pattern is visible on the associated display, hiding what was previously visible on the screen. Once invoked, the device lock shall remain in place until the user re-authenticates. No other system activity aside from re-authentication can unlock the system.
The operating system must lock the device after the organization defined time period. This prevents others from gaining access to the device when not in the user's possession and accessing sensitive DoD information. A device lock mitigates the risk that an adversary can access data on an unattended mobile device but only after the maximum of 15 minute period of inactivity.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000057On BlackBerry Device Service, set "Security Timeout" IT Policy rule to "15 minutes".On BlackBerry Device Service, ensure "Security Timeout" IT Policy rule is set to "15 minutes". Otherwise, this is a finding.SRG-OS-000056-MOS-000026<GroupDescription></GroupDescription>PB21-00-000130BlackBerry PlayBook OS must synchronize the internal clock at least once every 24 hours with an authoritative time server or the Global Positioning System.<VulnDiscussion>Determining the correct time a particular application event occurred on a system is critical when conducting forensic analysis and investigating system events.
Periodically synchronizing internal clocks with an authoritative time source is needed in order to correctly correlate the timing of events that occur across the enterprise. The two authoritative time sources for mobile operating systems are an authoritative time server which is synchronized with redundant United States Naval Observatory (USNO) time servers as designated for the appropriate DoD network (NIPRNet or SIPRNet) or the Global Positioning System (GPS).
Timestamps generated by the audit system in mobile operating systems shall include both date and time. The time may be expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000160Navigate to "Options -> Date & Time" and set "Set Date and Time Automatically" is to "ON".Navigate to "Options -> Date & Time" and ensure "Set Date and Time Automatically" is set to "ON". Otherwise, this is a finding.SRG-OS-000069-MOS-000044<GroupDescription></GroupDescription>PB21-00-000140BlackBerry PlayBook OS must disallow the device unlock password from containing fewer than a specified minimum number of upper case alphabetic characters, lower case alphabetic characters, and numeric characters.<VulnDiscussion>Password complexity or strength refers to how difficult it is to determine a password using a dictionary or brute force attack. Setting minimum numbers of certain types of characters increases password complexity, and therefore makes it more difficult for an adversary to discover the password. In the DoD, the expectation is that the setting will range from a minimum of 1 to 2 upper case alphabetic characters in the device unlock password. The parameter should be selected based on a risk assessment that weighs factors, such as the environments the device will be located and operational requirements for users to access data in a timely manner.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000192On BlackBerry Device Service:
Set "Minimum Password Complexity" IT Policy rule to: "At least 1 uppercase letter, 1 lowercase letter, 1 number, and 1 special character".1. Navigate to "Options -> BlackBerry Balance".
2. Select the Pencil icon.
3. Select "Change Password".
4. Select "Password Rules".
5. Verify the dialog states: "Password must contain at least one uppercase letter". Otherwise, this is a finding.SRG-OS-000070-MOS-000045<GroupDescription></GroupDescription>PB21-00-000150BlackBerry PlayBook OS must disallow the device unlock password from containing fewer than a specified minimum number of lower case alphabetic characters.<VulnDiscussion>Password complexity or strength refers to how difficult it is to determine a password using a dictionary or brute force attack. Setting minimum numbers of certain types of characters increases password complexity, and therefore makes it more difficult for an adversary to discover the password. In the DoD, the expectation is that the setting will range from a minimum of 1 to 2 lower case characters in the device unlock password. The parameter should be selected based on a risk assessment that weighs factors, such as the environments the device will be located and operational requirements for users to access data in a timely manner.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000193On BlackBerry Device Service:
Set "Minimum Password Complexity" IT Policy rule to: "At least 1 uppercase letter, 1 lowercase letter, 1 number, and 1 special character".1. Navigate to "Options -> BlackBerry Balance".
2. Select the Pencil icon.
3. Select "Change Password".
4. Select "Password Rules".
5. Verify the dialog states: "Password must contain at least one lowercase letter". Otherwise, this is a finding.SRG-OS-000071-MOS-000046<GroupDescription></GroupDescription>PB21-00-000160BlackBerry PlayBook OS must disallow the device unlock password from containing fewer than a specified minimum number of numeric characters.<VulnDiscussion>Password complexity or strength refers to how difficult it is to determine a password using a dictionary or brute force attack. Setting minimum numbers of certain types of characters increases password complexity, and therefore makes it more difficult for an adversary to discover the password. In the DoD, the expectation is that the setting will range from a minimum of 1 to 2 numeric characters in the device unlock password. The parameter should be selected based on a risk assessment that weighs factors, such as the environments the device will be located and operational requirements for users to access data in a timely manner.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000194On BlackBerry Device Service:
Set "Minimum Password Complexity" IT Policy rule to: "At least 1 uppercase letter, 1 lowercase letter, 1 number, and 1 special character".1. Navigate to "Options -> BlackBerry Balance".
2. Select the Pencil icon.
3. Select "Change Password".
4. Select "Password Rules".
5. Verify the dialog states: "Password must contain at least one number". Otherwise, this is a finding.SRG-OS-000076-MOS-000050<GroupDescription></GroupDescription>PB21-00-000170BlackBerry PlayBook OS must enforce a maximum lifetime of 120 days for the device unlock password (password age).<VulnDiscussion>Changing passcodes regularly prevents an attacker who has compromised the password from re-using it to regain access. This is an unlikely scenario, but is addressed by setting a password expiration. The IA control only needs to be enforced in product level STIGs, if there is a need for such rotation based on the expected operational use of the device.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000199On BlackBerry Device Service:
Set "Maximum Password Age" IT Policy rule to: 60.If the local command determines that there is not a need for password rotation based on the expected operational use of the device, this requirement does not apply.
On BlackBerry Device Service:
"Maximum Password Age" IT Policy rule must be set to 60 or less. Otherwise, this is a findingSRG-OS-000077-MOS-000051<GroupDescription></GroupDescription>PB21-00-000180BlackBerry PlayBook OS must prohibit a user from reusing any of the last five previously used device unlock passwords.<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting guessing and brute force attacks. Remembering the prior five device unlock passwords enables the operating system from permitting those passwords to be reused, which increases the resistance against password attacks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000200On BlackBerry Device Service:
Set "Maximum Password History" IT Policy rule to: 5.If the local command determines that there is not a need for password rotation based on the expected operational use of the device, this requirement does not apply.
On BlackBerry Device Service:
"Maximum Password History" IT Policy rule must be set to 5 or more. Otherwise, this is a finding.SRG-OS-000078-MOS-000052<GroupDescription></GroupDescription>PB21-00-000190BlackBerry PlayBook OS must enforce a minimum length for the work area password.<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting guessing and brute force attacks. The ability to crack a password is a function of how many times an attempt to crack the password, how quickly the adversary can do each attempt, and the size of the password space. The longer the minimum length of the password is, the larger the password space.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000205On BlackBerry Device Service:
Set "Minimum Password Length" IT Policy rule to: 8.1. Navigate to "Options -> BlackBerry Balance".
2. Select the Pencil icon.
3. Select "Change Password".
4. Select "Password Rules".
5. Verify the dialog states: "Password must be at least 8 characters long". Otherwise, this is a finding.SRG-OS-000078-MOS-000052<GroupDescription></GroupDescription>PB21-00-000200BlackBerry PlayBook OS must enforce a minimum length for the device unlock password.<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting guessing and brute force attacks. The ability to crack a password is a function of how many times an attempt to crack the password, how quickly the adversary can do each attempt, and the size of the password space. The longer the minimum length of the password is, the larger the password space.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000205Navigate to "Options -> Security -> Password -> Change Password". Input the old password under "Old Password". Under "New Password" and "Confirm Password" fields, input a new password that is greater or equal to 4 characters.Lock the device by "Battery icon -> Lock". Unlock the device using the device lock password. If the unlock password is less than 4 characters, this is a finding.SRG-OS-000095-MOS-000062<GroupDescription></GroupDescription>PB21-00-000210BlackBerry PlayBook OS must not permit mobile service carriers to have privileged access to the operating system or perform any function not directed by the user.<VulnDiscussion>Permitting mobile service carriers access to the mobile operating system leaves the device vulnerable to breach from rogue elements within the carrier infrastructure. Mobile service carriers are not subject to the same personnel, operational, and technical controls as DoD organizations. For example, its employees in most cases do not have active DoD clearances. When a mobile service carrier must update software or configuration on a mobile device, these updates must come from a DoD approved source, which in many cases is the vendor of the MOS software. Preventing mobile service carrier access to mobile operating systems greatly mitigates the risk associated with this vulnerability.
Research In Motion does not pre-install any software that would allow carriers to access or manipulate a BlackBerry device. As well, all applications available through App World are tested and monitored for malicious code, and applications must be signed by RIM to allow them to be installed on a BlackBerry Device, and these applications and their permissions must be acknowledged by the user or system administrator before they can be installed. </VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000381Navigate to "Options -> Security -> Application Permissions" and select each application listed, and set only DoD authorized permissions (Files, GPS Location, Camera, etc.) for this application to "Allowed" or "Prompt", with non-authorized permissions set to "Denied". Navigate to "Options -> Security -> Application Permissions" and select each application listed, and ensure only DoD authorized permissions (Files, GPS Location, Camera, etc.) for this application is set to "Allowed" or "Prompt", with non-authorized permissions set to "Denied". Otherwise, this is a finding.SRG-OS-000103-MOS-000065<GroupDescription></GroupDescription>PB21-00-000220BlackBerry PlayBook OS must prevent a user from installing applications from an untrusted source (other than BlackBerry World) in the personal space.<VulnDiscussion>The operating system must enforce software installation by users based upon what types of software installations are permitted (e.g., updates and security patches to existing software) and what types of installations are prohibited (e.g., software whose pedigree with regard to being potentially malicious is unknown or suspect) by the organization. The installation and execution of unauthorized software on an operating system may allow the application to obtain sensitive information or further compromise the system. Preventing a user from installing unapproved applications mitigates this risk.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000663On BlackBerry Device Service:
Set "Restrict Development Mode" IT Policy rule to "Yes".Navigate to "Options ->Security -> Development Mode" and ensure "Use Development Mode" is set to "OFF" and greyed out. Otherwise, this is a finding.SRG-OS-000103-MOS-000066<GroupDescription></GroupDescription>PB21-00-000230BlackBerry PlayBook OS must only permit download of software from a DoD approved source (e.g., DoD operated mobile device application store or MDM server).<VulnDiscussion>DoD can perform due diligence on sources of software to mitigate the risk that malicious software is introduced to those sources. Therefore, if software is downloaded from a DoD approved source, then it is less likely to be malicious than if it is downloaded from an unapproved source. To prevent access to unapproved sources, the operating system in most cases can be configured to disable user access to public application stores. However, in some cases, DoD may approve downloads directly from the OS vendor.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000663On BlackBerry Device Service:
1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand "Software -> Applications".
2. Click "Manage applications".
3. Delete all applications under "BlackBerry World Applications".
On BlackBerry Device Service:
1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand "Software -> Applications".
2. Click "Manage applications".
3. Review the applications listed under "BlackBerry World Applications". If any applications are listed, this is a finding.SRG-OS-000116-MOS-000070<GroupDescription></GroupDescription>PB21-00-000240BlackBerry PlayBook OSs Wi-Fi module must use EAP-TLS authentication when authenticating to DoD WLAN authentication servers.<VulnDiscussion>Without strong mutual authentication a mobile device may connect to an unauthorized network. In many cases, the user may falsely believe that the device is connected to an authorized network and then provide authentication credentials and other sensitive information. EAP-TLS is strong mutual authentication leveraging a public key infrastructure. Its use greatly mitigates risk associated with authentication transactions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000780On BlackBerry Device Service:
Select the affected Wi-Fi Profile, and set "Security Type" to "WPA Enterprise" or "WPA2 Enterprise" and "Security Sub Type" to "TLS".Navigate to "Options -> Wi-Fi -> Saved Networks" and select a Wi-Fi profile used to connect to DoD WLAN. Ensure "Security Type" is set to "WPA Enterprise" or "WPA2 Enterprise" and "Security Sub Type" (EAP security method) is set to "TLS". These options should be greyed out. Otherwise, this is a finding.
SRG-OS-000116-MOS-000071<GroupDescription></GroupDescription>PB21-00-000250BlackBerry PlayBook OS must authenticate devices before establishing remote network (e.g., VPN) connections using bidirectional cryptographically based authentication between devices.<VulnDiscussion>Without strong mutual authentication a mobile device may connect to an unauthorized network. In many cases, the user may falsely believe that the device is connected to an authorized network and then provide authentication credentials and other sensitive information. A strong bidirectional cryptographically based authentication method mitigates this risk.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000780On BlackBerry Device Service:
Create a VPN Profile with approved "Authentication Type" configured, and associate VPN Profile with IT Policy for the affected device.1. Navigate to "Options -> Security -> VPN".
2. Select the enterprise VPN Profile (Work VPN Profiles have a briefcase icon on the right hand side).
3. Verify "Authentication Type" is set to a bidirectional cryptographically based authentication, and greyed out. Otherwise, this is a finding.SRG-OS-000116-MOS-000073<GroupDescription></GroupDescription>PB21-00-000260BlackBerry PlayBook OS VPN client must employ DoD PKI approved mechanisms for authentication when connecting to DoD networks.<VulnDiscussion>VPNs are vulnerable to attack if they are not supported by strong authentication. An adversary may be able gain access to network resources and sensitive information if they can compromise the authentication process. Common Access Card (CAC) authentication is a strong cryptographic two-factor authentication that greatly mitigates the risk of VPN authentication breaches. Other DoD approved PKI mechanisms provide similar levels of assurance.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000780On BlackBerry Device Service, set select the applicable VPN Profile and set "Authentication Type" is to "PKI" or "XAUTH-PKI".Navigate to "Options -> Security -> VPN -> <VPN Profile>" and ensure "Authentication Type" is set to "PKI" or "XAUTH-PKI", and greyed out. Otherwise, this is a finding.SRG-OS-000160-MOS-000080<GroupDescription></GroupDescription>PB21-00-000270BlackBerry PlayBook OSs VPN client must use either IPSec or SSL/TLS when connecting to DoD networks.<VulnDiscussion>Use of non-standard communications' protocols can affect both the availability and confidentiality of communications. IPSec and SSL/TLS are both well-known and tested protocols that provide strong assurance with respect to both IA and interoperability.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-001130On BDS, select the affected VPN Profile for Edit, and set "Gateway Type" is to a type which supports and utilizes IPSec and SSL/TLS.
Navigate to "Options -> Security -> VPN". Select each VPN Profile used to connect to a DoD network, and ensure "Gateway Type" is set to a type which supports and utilizes IPSec and SSL/TLS and greyed out. Otherwise, this is a finding.SRG-OS-000176-MOS-000098<GroupDescription></GroupDescription>PB21-00-000290BlackBerry PlayBook OS must prohibit the use of non-DoD authorized instant messaging (IM) systems.<VulnDiscussion>Many instant messaging systems have known vulnerabilities, some of which allow an adversary to install malware on the device. This malware can then be used to obtain sensitive information or further compromise DoD information systems. Restricting IM traffic to DoD authorized IM systems mitigates the risk of using IM technology.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-001154On BlackBerry Device Service:
1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand "Software -> Applications".
2. Click "Manage applications".
3. Delete the unauthorized IM system application.
On BlackBerry Device Service:
1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand "Software -> Applications".
2. Click "Manage applications".
3. Review the listed IM systems. If any unauthorized IM systems are listed, this is a finding.SRG-OS-000179-MOS-000101<GroupDescription></GroupDescription>PB21-00-000310Only DoD PKI issued or DoD approved software authentication certificates may be installed on BlackBerry PlayBook OS.<VulnDiscussion>If unauthorized software authentication certificates are installed on the device, then the operating system would not block malware signed by the entity that published these certificates. Such malware could be used to obtain sensitive DoD information or to further breach system security. Eliminating unapproved software authentication certificates greatly mitigates the risk of malware passing authentication controls.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-001159On BlackBerry Device Service Server:
Remove the corresponding .pem file from <drive>:\<shared_network_folder>\Shared\Certificates\<ENTERPRISE/VPN/WIFI/www> folder.Navigate to "Options -> Security -> Certificates". Select each certificate listed under "All Certificates". In "Certificate Details", ensure "Issued By" states appropriate DoD certificate authority, or the certificate itself has been approved by DoD. Otherwise, this is a finding.SRG-OS-000179-MOS-000102<GroupDescription></GroupDescription>PB21-00-000320Only DoD PKI issued or DoD approved server authentication certificates may be installed on BlackBerry PlayBook OS.<VulnDiscussion>If unauthorized device authentication certificates are installed on the device, there is the potential that the device may connect to a rogue device or network. Rogue devices can mimic the behavior of authorized equipment to trick the user into providing authentication credentials, which could then in turn be used to compromise DoD information and networks. Restricting device authentication certificates to an authorized list mitigates the risk of attaching to rogue devices and networks.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-001159On BlackBerry Device Service Server:
Remove the corresponding .pem file from <drive>:\<shared_network_folder>\Shared\Certificates\<ENTERPRISE/VPN/WIFI/www> folder.Navigate to "Options -> Security -> Certificates". Select each certificate listed under "All Certificates". In "Certificate Details", ensure "Issued By" states appropriate DoD certificate authority, or the certificate itself has been approved by DoD. Otherwise, this is a finding.SRG-OS-000197-MOS-000107<GroupDescription></GroupDescription>PB21-00-000330BlackBerry PlayBook OS must prevent a user from using a browser that does not direct its traffic to a DoD proxy server.<VulnDiscussion>Proxy servers can inspect traffic for malware and other signs of a security attack. Allowing a mobile device to access the public Internet without proxy server inspection forgoes the protection that the proxy server would otherwise provide. Malware downloaded onto the device could have a wide variety of malicious consequences, including loss of sensitive DoD information. Forcing traffic to flow through a proxy server greatly mitigates the risk of access to public Internet resources.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-001265On BlackBerry Device Service:
1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand "Software -> Applications".
2. Click "Manage applications".
3. Delete the unauthorized browser application.
On BlackBerry Device Service:
1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand "Software -> Applications".
2. Click "Manage applications".
3. Review the listed browser applications. If any unauthorized browser applications are listed, this is a finding.SRG-OS-000229-MOS-000117<GroupDescription></GroupDescription>PB21-00-000350BlackBerry PlayBook OS must employ mobile device management services to centrally manage IT Policies<VulnDiscussion>Security related parameters are those parameters impacting the security state of the system and include parameters related to the implementation of other IA controls. If these controls are not implemented, the system may be vulnerable to a variety of attacks. The use of an MDM allows an organization to assign values to security related parameters across all the devices it manages. This provides assurance that the required mobile OS security controls are being enforced, and that the device user or an adversary has not modified or disabled the controls. It also greatly increases efficiency and manageability of devices in a large scale environment relative to an environment in which each device must be configured separately.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000370On BlackBerry Device Service:
1. Navigate to "BlackBerry solution management -> User -> Manage users -> <affected user's device PIN>".
2. Select "Resend IT Policy to a device".1. Navigate to "Options -> About -> BlackBerry Balance".
2. Review the "IT Policy Name" assigned to the user. If different from the BDS policy, this is a finding.SRG-OS-000229-MOS-000117<GroupDescription></GroupDescription>PB21-00-000360BlackBerry PlayBook OS must employ mobile device management services to centrally manage email settings<VulnDiscussion>Security related parameters are those parameters impacting the security state of the system and include parameters related to the implementation of other IA controls. If these controls are not implemented, the system may be vulnerable to a variety of attacks. The use of an MDM allows an organization to assign values to security related parameters across all the devices it manages. This provides assurance that the required mobile OS security controls are being enforced, and that the device user or an adversary has not modified or disabled the controls. It also greatly increases efficiency and manageability of devices in a large scale environment relative to an environment in which each device must be configured separately.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000370On BlackBerry Device Service:
1. Navigate to "BlackBerry solution management -> Profiles -> Manage email profiles".
2. Ensure all required profiles are listed. If not, create necessary profiles by navigating to "BlackBerry solution management -> Profiles -> Create email profiles".
3. Assign all required email profiles to the affected user, or a group containing the user.To verify IT Policy:
1. Navigate to "Options -> Accounts".
2. Verify that all required work accounts (with a briefcase icon) are present. Otherwise, this is a finding.SRG-OS-000229-MOS-000117<GroupDescription></GroupDescription>PB21-00-000370BlackBerry PlayBook OS must employ mobile device management services to centrally manage Wi-Fi profiles<VulnDiscussion>Security related parameters are those parameters impacting the security state of the system and include parameters related to the implementation of other IA controls. If these controls are not implemented, the system may be vulnerable to a variety of attacks. The use of an MDM allows an organization to assign values to security related parameters across all the devices it manages. This provides assurance that the required mobile OS security controls are being enforced, and that the device user or an adversary has not modified or disabled the controls. It also greatly increases efficiency and manageability of devices in a large scale environment relative to an environment in which each device must be configured separately.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000370On BlackBerry Device Service:
1. Navigate to "BlackBerry solution management -> Profiles -> Manage Wi-Fi Profiles".
2. Ensure all required profiles are listed. If not, create necessary profiles by navigating to "BlackBerry solution management -> Profiles -> Create Wi-Fi Profiles".
3. Assign all required Wi-Fi profiles to the affected user, or a group containing the user.1. Navigate to "Options -> Wi-Fi -> Saved Networks".
2. Verify that all required work Wi-Fi profiles (with a briefcase icon) are present. Otherwise, this is a finding.SRG-OS-000229-MOS-000117<GroupDescription></GroupDescription>PB21-00-000380BlackBerry PlayBook OS must employ mobile device management services to centrally manage VPN profiles<VulnDiscussion>Security related parameters are those parameters impacting the security state of the system and include parameters related to the implementation of other IA controls. If these controls are not implemented, the system may be vulnerable to a variety of attacks. The use of an MDM allows an organization to assign values to security related parameters across all the devices it manages. This provides assurance that the required mobile OS security controls are being enforced, and that the device user or an adversary has not modified or disabled the controls. It also greatly increases efficiency and manageability of devices in a large scale environment relative to an environment in which each device must be configured separately.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000370On BlackBerry Device Service:
1. Navigate to "BlackBerry solution management -> Profiles -> Manage VPN Profiles".
2. Ensure all required profiles are listed. If not, create necessary profiles by navigating to "BlackBerry solution management -> Profiles -> Create VPN Profiles".
3. Assign all required VPN profiles to the affected user, or a group containing the user.1. Navigate to "Options -> Security -> VPN".
2. Verify that all required work VPN profiles (with a briefcase icon) are present. Otherwise, this is a finding.SRG-OS-000230-MOS-000118<GroupDescription></GroupDescription>PB21-00-000390BlackBerry PlayBook OS must encrypt all data on the mobile device using AES encryption (AES 128 bit encryption key length is the minimum requirement; AES 256 desired).<VulnDiscussion>If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on data access, an adversary can remove non-volatile memory and read it directly, thereby circumventing operating system controls. Encrypting the data ensures that confidentiality is protected even when the operating system is not running. AES encryption with appropriate key lengths provides assurance that the cryptography is adequate.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-001200On BlackBerry Device Service, set "Personal Space Data Encryption" IT Policy rule to "Yes".Navigate to "Options -> Security -> Encryption" and ensure it states: "Personal data and files are encrypted" and cannot be disabled. Otherwise, this is a finding.SRG-OS-000231-MOS-000121<GroupDescription></GroupDescription>PB21-00-000400BlackBerry PlayBook OS must prohibit wireless remote access connections except for personal hotspot service.<VulnDiscussion>The device acts as a personal hotspot when it accepts remote connections on a local area network interface for the purposes of routing traffic to a wide area network interface. The most common implementation is to accept local area Wi-Fi connections to reach ISP service provided by a cellular data carrier. The objective is to ensure the remote devices are not able to access any applications, data, or other operating system functionality on the device. A core assumption of the MOS SRG is that mobile devices do not serve applications to remote devices. If remote access to applications and data were feasible, this would open up a wide variety of vulnerabilities in which an adversary with a remote wireless capability could breach system security. Precluding this possibility greatly mitigates the risk of such an attack.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000066Navigate to "Options -> Storage & Sharing" and set "Wi-Fi Sharing" to "OFF".Navigate to "Options -> Storage & Sharing" and ensure "Wi-Fi Sharing" is set to "OFF". Otherwise, this is a finding.SRG-OS-999999-MOS-000134<GroupDescription></GroupDescription>PB21-00-000410BlackBerry PlayBook OS must not permit a user to disable the password-protected lock feature on the work space.<VulnDiscussion>If the user is able to disable the password-protected lock feature, the user can change the configuration of the device to allow access without a password. The modified configuration would enable an adversary with access to the device to obtain DoD information and possibly other information resources on other systems. An operating system that does not allow a user to disable this feature mitigates the risk of this attack. In cases in which the mobile operating system relies on another application for protected data storage (e.g., if FIPS 140-2 validated encryption for unclassified use is not native to the device), then this requirement applies to both the device lock password and the password to the data storage application.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000366On BlackBerry Device Service:
Set "Password Required for Work Space" IT Policy rule to: "Yes".1. Navigate to "Options -> BlackBerry Balance".
2. Select the Pencil icon.
3. Verify the "Remove Password" button is greyed out. Otherwise, this is a finding.SRG-OS-999999-MOS-000134<GroupDescription></GroupDescription>PB21-00-000420BlackBerry PlayBook OS must allow user to configure a non-complex 4 digit password for the personal space.<VulnDiscussion>If the user is able to disable the password-protected lock feature, the user can change the configuration of the device to allow access without a password. The modified configuration would enable an adversary with access to the device to obtain DoD information and possibly other information resources on other systems. An operating system that does not allow a user to disable this feature mitigates the risk of this attack. In cases in which the mobile operating system relies on another application for protected data storage (e.g., if FIPS 140-2 validated encryption for unclassified use is not native to the device), then this requirement applies to both the device lock password and the password to the data storage application.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-0003661. Navigate to "Options -> Security -> Password".
2. Set "Enable Password" is set to "ON".
3. Create a 4 digit passcode for the device.1. Navigate to "Options -> Security -> Password".
2. Verify "Enable Password" is set to "ON". Otherwise, this is a finding.SRG-OS-999999-MOS-999999<GroupDescription></GroupDescription>PB21-00-000000BlackBerry PlayBook OS versions no longer supported by the manufacturer or vendor must not be installed on a device.<VulnDiscussion>Unsupported versions of the operating system do not contain new security-related features and security patches that address known vulnerabilities. Software or hardware no longer supported by the manufacturer or vendor are not maintained or updated for current vulnerabilities leaving them open to potential attack.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>DPMS Target BlackBerry PlayBook OS 2.1DISA FSODPMS TargetBlackBerry PlayBook OS 2.12456CCI-000366Replace the BlackBerry PlayBook with an approved device.Manufacturer support for BlackBerry Playbook tablets ended April 2014. If BlackBerry Playbook tablets are in use, this is a finding.