Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-70085 | MSWM-10-200512 | SV-84707r1_rule | Medium |
Description |
---|
Bluetooth usage could provide an attack vector for a hacker to connect to a mobile OS device without the knowledge of the user. Disabling Bluetooth advertising/beaconing reduces the risk of a non-authorized Bluetooth device connecting the DoD mobile OS device. SFR ID: FMT_SMF_EXT.1.1 #20d |
STIG | Date |
---|---|
Microsoft Windows 10 Mobile Security Technical Implementation Guide | 2017-09-11 |
Check Text ( C-70561r1_chk ) |
---|
Review Windows 10 Mobile configuration settings to determine if the mobile device is enforcing the policy to prevent Bluetooth Low Energy (LE) apps from doing any Bluetooth advertising. This validation procedure is performed only on the MDM administration console. Check whether the appropriate setting is configured on the MDM. Administration Console: 1. Ask the MDM administrator to show the Bluetooth device advertising" security policy. 2. Verify the "allow Bluetooth device advertising" security policy was set to disallowed for Windows 10 Mobile devices. If the MDM does not disable the policy for "allow Bluetooth device advertising", this is a finding. |
Fix Text (F-76321r1_fix) |
---|
Configure the MDM system to enforce a policy that restricts "allow Bluetooth device advertising" policy to prevent low energy Bluetooth devices from advertising. Deploy the policy on managed devices. |