UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The organization must produce a written policy and training material that states CMDs classified as non-enterprise activated must not access DoD email systems.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35994 SRG-MPOL-076 SV-47310r1_rule Medium
Description
Some CMDs are not authorized to connect to DoD email systems because they do not have required security controls. There is a high risk of introducing malware on a DoD email system or of compromising sensitive DoD data if these types of devices are connected to a DoD email system. There is a high risk sensitive data will be exposed to unauthorized personnel with access to the device if DoD email was viewed, processed, or stored on the device.
STIG Date
Mobile Policy Security Requirements Guide 2013-01-24

Details

Check Text ( C-44231r1_chk )
CMDs classified as non-enterprise activated are not authorized to access DoD networks or store or process sensitive DoD information.

Interview the security personnel and 2-3 users who are using mobile OS devices that are managed by the site, and which are not authorized to connect to DoD email systems.

Verify written policy and training material exists (or requirement is listed on a signed user agreement) stating mobile devices must not be used to connect to a DoD email system.

If written policy and training material does not exist or users are not aware of the requirement, this is a finding.
Fix Text (F-40521r1_fix)
Develop a written policy and training material that states CMDs classified as non-enterprise activated must not access DoD email systems.