UCF STIG Viewer Logo

Required actions will be followed at the site when a smartphone has been lost or stolen.


Overview

Finding ID Version Rule ID IA Controls Severity
V-24969 WIR-SPP-007-02 SV-30706r2_rule ECSC-1 Low
Description
DoD data could be compromised if required actions are not followed.
STIG Date
Smartphone Policy Security Technical Implementation Guide 2011-04-08

Details

Check Text ( C-31133r1_chk )
Interview the IAO. Determine if any site smartphones were reported lost or stolen within the previous 24 months. If yes, review written records, incident reports, and/or after action reports and determine if required procedures were followed.
Fix Text (F-27592r1_fix)
Required actions must be followed at the site when a smartphone is reported lost or stolen.