UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

An authorization process must be developed and published that states the process to obtain approval before CMDs can connect to the organizations information system(s).


Overview

Finding ID Version Rule ID IA Controls Severity
V-35988 SRG-MPOL-070 SV-47304r1_rule Medium
Description
In order to protect their information systems, organizations must have a process in place ensuring mobile devices adhere to implementation guidance, meet published usage restrictions, and are processed through an authorization process prior to connecting to the information system(s). Lacking such a process, organizations will experience an array of unauthorized mobile devices, with a myriad of configuration settings and no usage restrictions, connecting to their information systems. Such an environment would be unmanageable and could result in unauthorized access to, modification of, or destruction of sensitive or classified data.
STIG Date
Mobile Policy Security Requirements Guide 2013-07-03

Details

Check Text ( C-44225r1_chk )
Review the organization's access control and security policy and procedures addressing access control and authorization process for portable and mobile devices. Ensure the organization has developed and published an authorization process to be performed on each mobile device before the device can connect to the organization's information system(s). This authorization process will ensure the mobile device complies with all organization-published usage restrictions and implementation guidance.

If an authorization process has not been developed and published, this is a finding.
Fix Text (F-40515r1_fix)
Develop and publish an authorization process to be performed on each mobile device before the device can connect to the organization's information system(s).