UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The mobile operating system must prohibit the use of non-DoD authorized instant messaging (IM) systems.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33165 SRG-OS-000176-MOS-000098 SV-43563r1_rule Medium
Description
Many instant messaging systems have known vulnerabilities, some of which allow an adversary to install malware on the device. This malware can then be used to obtain sensitive information or further compromise DoD information systems. Restricting IM traffic to DoD authorized IM systems mitigates the risk of using IM technology.
STIG Date
Mobile Operating System Security Requirements Guide 2012-10-01

Details

Check Text ( C-41426r1_chk )
Inspect the mobile operating system configuration for prohibiting the use of non-DoD authorized instant messaging (IM) systems. If non-DoD authorized IM clients pass either inbound or outbound traffic, this is a finding.
Fix Text (F-37065r1_fix)
Remove non-DoD authorized IM applications from the device.