BlackBerry Enterprise Mobility Server 2.x Security Technical Implementation Guide
V1R2 | 2018-11-29 | U_BEMS_2-x_STIG_V1R2_Manual-xccdf.xml | |
---|---|---|---|
V1R1 | 2017-12-11 | U_BEMS_2-x_STIG_V1R1_Manual-xccdf.xml | |
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected] |
Comparison |
---|
All 23 |
No Change 22 |
Updated 1 |
Added 0 |
Removed 0 |
V-79003
No Change
Findings ID: | BEMS-00-002600 | Rule ID: | SV-93709r1_rule | Severity: | medium | CCI: | CCI-000162 |
---|
Discussion
If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In addition, access to log records provides information an attacker could potentially use to his or her advantage.Application servers contain admin interfaces that allow reading and manipulation of log records. Therefore, these interfaces should not allow unfettered access to those records. Application servers also write log data to log files which are stored on the OS, so appropriate file permissions must also be used to restrict access.
Log information includes all information (e.g., log records, log settings, transaction logs, and log reports) needed to successfully log information system activity. Application servers must protect log information from unauthorized read access.
Checks
Verify BEMS has been configured with the following administrator groups/roles, each group/role has required permissions, and at least one user has been assigned to each Administrator group/role: Server primary administrator, auditor.Procedure for Server Primary Administrator:
1. In the BEMS Dashboard, under "BEMS System Settings", click "BEMS Configuration".
2. Click "Dashboard Administrators".
3. Confirm the Administrator role for the primary server administrator has been assigned the dashboard role of Admin.
4. Verify in AD at least one member has been assigned to the BEMS administrator group. (Note: Actual group name may be different.)
Procedure for Auditor:
1. Verify in AD an auditor group has been set up with at least one member.
2. Browse to the log repository.
3. Right-click on the folder.
4. Select "Properties".
5. Select the "Security" tab.
6. Confirm the auditor security group is listed.
If required administrator roles have not been set up on BEMS and at least one user has not been assigned to each role, this is a finding.
Fix
Configure BEMS to have at least one user in the following Administrator roles: Server primary administrator, auditor.1. In the BEMS Dashboard, under "BEMS System Settings", click "BEMS Configuration".
2. Click "Dashboard Administrators".
3. Click "Add Group".
4. In the "Active Directory Security Group" field, type the name of the Microsoft Active Directory security group.
5. Click "Save".
6. Repeat steps 3 to 5 to add additional security groups.
7. For the server primary administrator, the default role of Admin meets the required roles and no additional configuration is needed.
8. For the Auditor role, complete the following steps:
- In active directory, create a domain auditor group and assign personnel designated as auditors to that group.
- Browse to the log repository.
- Right-click on the folder.
- Select "Properties".
- Select the "Security" tab.
- Click "Edit".
- Click "Add".
- Type in name of the user group.
- Confirm that only the necessary groups have rights to the folder (CREATOR OWNER, SYSTEM, Administrators, Auditors).
- Set proper permissions for auditors (Read, List folder contents, Read & Execute).
V-79005
No Change
Findings ID: | BEMS-00-002700 | Rule ID: | SV-93711r1_rule | Severity: | medium | CCI: | CCI-000163 |
---|
Discussion
If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In addition, access to log records provides information an attacker could potentially use to his or her advantage.Application servers contain admin interfaces that allow reading and manipulation of log records. Therefore, these interfaces should not allow unfettered access to those records. Application servers also write log data to log files which are stored on the OS, so appropriate file permissions must also be used to restrict access.
Log information includes all information (e.g., log records, log settings, transaction logs and log reports) needed to successfully log information system activity. Application servers must protect log information from unauthorized modification.
Checks
Verify BEMS has been configured with the following administrator groups/roles, each group/role has required permissions, and at least one user has been assigned to each Administrator group/role: Server primary administrator, auditor.Procedure for Server Primary Administrator:
1. In the BEMS Dashboard, under "BEMS System Settings", click "BEMS Configuration".
2. Click "Dashboard Administrators".
3. Confirm the Administrator role for the primary server administrator has been assigned the dashboard role of Admin.
4. Verify in AD at least one member has been assigned to the BEMS administrator group. (Note: Actual group name may be different.)
Procedure for Auditor:
1. Verify in AD an auditor group has been set up with at least one member.
2. Browse to the log repository.
3. Right-click on the folder.
4. Select "Properties".
5. Select the "Security" tab.
6. Confirm the auditor security group is listed.
If required administrator roles have not been set up on BEMS and at least one user has not been assigned to each role, this is a finding.
Fix
Configure BEMS to have at least one user in the following Administrator roles: Server primary administrator, auditor.1. In the BEMS Dashboard, under "BEMS System Settings", click "BEMS Configuration".
2. Click "Dashboard Administrators".
3. Click "Add Group".
4. In the "Active Directory Security Group" field, type the name of the Microsoft Active Directory security group.
5. Click "Save".
6. Repeat steps 3 to 5 to add additional security groups.
7. For the server primary administrator, the default role of Admin meets the required roles and no additional configuration is needed.
8. For the Auditor role, complete the following steps:
- In active directory, create a domain auditor group and assign personnel designated as auditors to that group.
- Browse to the log repository.
- Right-click on the folder.
- Select "Properties".
- Select the "Security" tab.
- Click "Edit".
- Click "Add".
- Type in name of the user group.
- Confirm that only the necessary groups have rights to the folder (CREATOR OWNER, SYSTEM, Administrators, Auditors).
- Set proper permissions for auditors (Read, List folder contents, Read & Execute).
V-79007
No Change
Findings ID: | BEMS-00-002800 | Rule ID: | SV-93713r1_rule | Severity: | medium | CCI: | CCI-000164 |
---|
Discussion
If log data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve.Application servers contain admin interfaces that allow reading and manipulation of log records. Therefore, these interfaces should not allow for unfettered access to those records. Application servers also write log data to log files which are stored on the OS, so appropriate file permissions must also be used to restrict access.
Log information includes all information (e.g., log records, log settings, transaction logs, and log reports) needed to successfully log information system activity. Application servers must protect log information from unauthorized deletion.
Checks
Verify BEMS has been configured with the following administrator groups/roles, each group/role has required permissions, and at least one user has been assigned to each Administrator group/role: Server primary administrator, auditor.Procedure for Server Primary Administrator:
1. In the BEMS Dashboard, under "BEMS System Settings", click "BEMS Configuration".
2. Click "Dashboard Administrators".
3. Confirm the Administrator role for the primary server administrator has been assigned the dashboard role of Admin.
4. Verify in AD at least one member has been assigned to the BEMS administrator group. (Note: Actual group name may be different.)
Procedure for Auditor:
1. Verify in AD an auditor group has been set up with at least one member.
2. Browse to the log repository.
3. Right-click on the folder.
4. Select "Properties".
5. Select the "Security" tab.
6. Confirm the auditor security group is listed.
If required administrator roles have not been set up on BEMS and at least one user has not been assigned to each role, this is a finding.
Fix
Configure BEMS to have at least one user in the following Administrator roles: Server primary administrator, auditor.1. In the BEMS Dashboard, under "BEMS System Settings", click "BEMS Configuration".
2. Click "Dashboard Administrators".
3. Click "Add Group".
4. In the "Active Directory Security Group" field, type the name of the Microsoft Active Directory security group.
5. Click "Save".
6. Repeat steps 3 to 5 to add additional security groups.
7. For the server primary administrator, the default role of Admin meets the required roles and no additional configuration is needed.
8. For the Auditor role, complete the following steps:
- In active directory, create a domain auditor group and assign personnel designated as auditors to that group.
- Browse to the log repository.
- Right-click on the folder.
- Select "Properties".
- Select the "Security" tab.
- Click "Edit".
- Click "Add".
- Type in name of the user group.
- Confirm that only the necessary groups have rights to the folder (CREATOR OWNER, SYSTEM, Administrators, Auditors).
- Set proper permissions for auditors (Read, List folder contents, Read & Execute).
V-79009
No Change
Findings ID: | BEMS-00-003800 | Rule ID: | SV-93715r1_rule | Severity: | medium | CCI: | CCI-000382 |
---|
Discussion
Most information systems are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Unneeded services and processes provide additional threat vectors and avenues of attack to the information system. BEMS is a critical component of the mobility architecture and must be configured to enable only those ports, protocols, and services (PPS) necessary to support functionality. All others must be expressly disabled or removed. A DoD-approved firewall implements the required network restrictions. A host-based firewall is appropriate where BEMS runs on a standalone platform. Network firewalls or other architectures may be preferred where BEMS runs in a cloud or virtualized solution.Checks
Review the BEMS configuration to determine whether a DoD-approved firewall is installed or if the platform operating system provides a firewall service that can restrict both inbound and outbound traffic by TCP/UDP port and IP address.If there is not a host-based firewall present on BEMS, this is a finding.
Fix
Install a DoD-approved firewall.
V-79011
No Change
Findings ID: | BEMS-00-003900 | Rule ID: | SV-93717r1_rule | Severity: | medium | CCI: | CCI-000382 |
---|
Discussion
Most information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations. Since BEMS is a critical component of the mobility architecture and must be configured to enable only those ports, protocols, and services (PPS) necessary to support functionality, all others must be expressly disabled or removed. A firewall installed on BEMS provides a protection mechanism to ensure unwanted service requests do not reach BEMS and outbound traffic is limited to only BEMS functionality.Checks
Ask the BEMS administrator for a list of ports, protocols, and IP address ranges necessary to support BEMS functionality. A list can usually be found in the STIG Supplemental document or MDM product documentation.Compare the list against the configuration of the firewall and identify discrepancies.
If the host-based firewall is not configured to support only those ports, protocols, and IP address ranges necessary for operation, this is a finding.
Fix
Configure the firewall on BEMS to only permit ports, protocols, and IP address ranges necessary for operation.
V-79013
No Change
Findings ID: | BEMS-00-004000 | Rule ID: | SV-93719r1_rule | Severity: | medium | CCI: | CCI-000382 |
---|
Discussion
All ports, protocols, and services used on DoD networks must be approved and registered via the DoD PPSM process. This is to ensure that a risk assessment has been completed before a new port, protocol, or service is configured on a DoD network and has been approved by proper DoD authorities. Otherwise, the new port, protocol, or service could cause a vulnerability to the DoD network, which could be exploited by an adversary.Checks
Ask the BEMS administrator for a list of ports, protocols, and services that have been configured on the host-based firewall of BEMS or generate the list by inspecting the firewall. Verify all allowed ports, protocols, and services are included on the DoD PPSM CAL list.If any allowed ports, protocols, and services on the MDM host-based firewall are not included on the DoD PPSM CAL list, this is a finding.
Fix
Turn off any ports, protocols, and services on the BEMS host-based firewall that are not on the DoD PPSM CAL list.
V-79015
Updated
Findings ID: | BEMS-00-011400 | Rule ID: | SV-93721r |
Severity: | medium | CCI: | CCI-002418 |
---|
Discussion
Preventing the disclosure of transmitted information requires that the application server take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Layer Security (TLS).Transmission of data can take place between the application server and a large number of devices/applications external to the application server. Examples are a web client used by a user, a backend database, a log server, or other application servers in an application server cluster.
If data is transmitted unencrypted, the data then becomes vulnerable to disclosure. The disclosure may reveal user identifier/password combinations, website code revealing business logic, or other user personal information.
FIPS 140-2 approved TLS versions include TLS V1.0 or greater.
TLS must be enabled and non-FIPS-approved SSL versions must be disabled. NIST SP 800-52 specifies the preferred configurations for government systems. Note, all versions of SSL are not authorized for use per SP 800-52.
Checks
Verify BEMS has been configured to use only approved versions of TLS as follows:1. Find the xml file "jetty.xml" located in the BEMS install directory on the BEMS host Windows server.
2. Find the "ExcludeProtocols" field.
3. Verify if unauthorized versions of SSL and TLS are listed in the "jetty.xml" file.
If BEMS has not been configured to use only approved versions of TLS, this is a finding.
Fix
Configure BEMS to use approved versions of TLS.1. Find the xml file "jetty.xml" located in the BEMS install directory on the BEMS host Windows server.
2. Find the "ExcludeProtocols" field and remove all unauthorized versions or SSL and TLS.
3. Save the file.
4. Restart the BEMS server.
V-79017
No Change
Findings ID: | BEMS-00-011500 | Rule ID: | SV-93723r1_rule | Severity: | medium | CCI: | CCI-002418 |
---|
Discussion
During the initial setup of a Transport Layer Security (TLS) connection to the application server, the client sends a list of supported cipher suites in order of preference. The application server will reply with the cipher suite it will use for communication from the client list. If an attacker can intercept the submission of cipher suites to the application server and place, as the preferred cipher suite, a weak export suite, the encryption used for the session becomes easy for the attacker to break, often within minutes to hours.Checks
Verify BEMS has been configured to remove all export ciphers:1. Find the xml file "jetty.xml" located in the BEMS install directory on the BEMS host Windows server.
2. Find the "ExcludeCiphersSuites" field.
3. Verify if any export ciphers are listed in the "jetty.xml" file.
If BEMS has been configured to use export ciphers, this is a finding.
Fix
Configure BEMS to remove all export ciphers.1. Find the xml file "jetty.xml" located in the BEMS install directory on the BEMS host Windows server.
2. Find the "ExcludeCiphersSuites" field and remove all export ciphers.
3. Save file.
4. Restart the BEMS server.
V-79019
No Change
Findings ID: | BEMS-00-013300 | Rule ID: | SV-93725r1_rule | Severity: | medium | CCI: | CCI-000213 |
---|
Discussion
Having several administrative roles for the BEMS supports separation of duties. This allows administrator-level privileges to be granted granularly, such as giving application management privileges to one group and security policy privileges to another group. This helps prevent administrators from intentionally or inadvertently altering other settings and configurations they may not understand or approve of, which can weaken overall security and increase the risk of compromise.- Server primary administrator: Responsible for server installation, initial configuration, and maintenance functions. Responsible for the setup and maintenance of security configuration administrator and auditor accounts.
- Auditor: Responsible for reviewing and maintaining server and mobile device audit logs.
Checks
Verify BEMS has been configured with the following administrator groups/roles, each group/role has required permissions, and at least one user has been assigned to each Administrator group/role: Server primary administrator, auditor.Procedure for Server Primary Administrator:
1. In the BEMS Dashboard, under "BEMS System Settings", click "BEMS Configuration".
2. Click "Dashboard Administrators".
3. Confirm the Administrator role for the primary server administrator has been assigned the dashboard role of Admin.
4. Verify in AD at least one member has been assigned to the BEMS administrator group. (Note: Actual group name may be different.)
Procedure for Auditor:
1. Verify in AD an auditor group has been set up with at least one member.
2. Browse to the log repository.
3. Right-click on the folder.
4. Select "Properties".
5. Select the "Security" tab.
6. Confirm the auditor security group is listed.
If required administrator roles have not been set up on BEMS and at least one user has not been assigned to each role, this is a finding.
Fix
Configure BEMS to have at least one user in the following Administrator roles: Server primary administrator, auditor.1. In the BEMS Dashboard, under "BEMS System Settings", click "BEMS Configuration".
2. Click "Dashboard Administrators".
3. Click "Add Group".
4. In the "Active Directory Security Group" field, type the name of the Microsoft Active Directory security group.
5. Click "Save".
6. Repeat steps 3 to 5 to add additional security groups.
7. For the server primary administrator, the default role of Admin meets the required roles and no additional configuration is needed.
8. For the Auditor role, complete the following steps:
- In active directory, create a domain auditor group and assign personnel designated as auditors to that group.
- Browse to the log repository.
- Right-click on the folder.
- Select "Properties".
- Select the "Security" tab.
- Click "Edit".
- Click "Add".
- Type in name of the user group.
- Confirm that only the necessary groups have rights to the folder (CREATOR OWNER, SYSTEM, Administrators, Auditors).
- Set proper permissions for auditors (Read, List folder contents, Read & Execute).
V-79021
No Change
Findings ID: | BEMS-00-013400 | Rule ID: | SV-93727r1_rule | Severity: | medium | CCI: | CCI-000764 |
---|
Discussion
To assure accountability and prevent unauthorized access, organizational users must be identified and authenticated. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors, guest researchers, individuals from allied nations). Users (and any processes acting on behalf of users) are uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization, which outlines specific user actions that can be performed on the information system without identification or authentication.Checks
Verify BEMS is configured for Windows Authentication for the database connection as follows:In the Database Information dialog box, verify "Windows Authentication" is selected.
If "Windows Authentication" is not selected for the BEMS database connection, this is a finding.
Fix
Set up Windows Authentication for the database connection on the BEMS console. In the Database Information dialog box, perform the following actions:1. In the "Host" field, type the instance name of your SQL Server.
2. In the "Database" name field, type the name for the BEMS-Core database.
3. In the "Port" field, type the port number that connects to the SQL Server.
4. Select "Windows Authentication".
5. Click "Next".
V-79023
No Change
Findings ID: | BEMS-00-013500 | Rule ID: | SV-93729r1_rule | Severity: | high | CCI: | CCI-000068 |
---|
Discussion
Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order to protect the information during transmission to web applications. This is usually achieved through the use of HTTPS.Checks
Verify BEMS has been configured to use HTTPS as follows:1. In the BEMS Dashboard, under "BEMS System Settings", click "BEMS Configuration".
2. Click "BlackBerry Dynamics".
3. In the Protocol drop-down list, verify "HTTPS" is selected.
If HTTPS is not configured on BEMS, this is a finding.
Fix
Configure BEMS to use HTTPS as follows:1. In the BEMS Dashboard, under "BEMS System Settings", click "BEMS Configuration".
2. Click "BlackBerry Dynamics".
3. In the Protocol drop-down list, select "HTTPS".
V-79025
No Change
Findings ID: | BEMS-00-013600 | Rule ID: | SV-93731r1_rule | Severity: | medium | CCI: | CCI-002470 |
---|
Discussion
Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient security controls. If the CA used for verifying the certificate is not a DoD-approved CA, trust of this CA has not been established.Checks
Verify a DoD SSL certificate has been installed on BEMS as follows:1. Open the browser.
2. Browse to the BEMS dashboard.
3. Select SSL certificate and view the certificate.
4. Verify the certificate is a DoD certificate (has the DoD CA listed in the certificate).
If the SSL certificate installed on BEMS is not a DoD certificate, this is a finding.
Fix
Replace the auto-generated BEMS SSL certificate with a DoD certificate as follows:1. Generate a CSR request and obtain a certificate from the DoD CA.
2. Import the certificate into the BEMS keystore.
3. Update the certificate passwords in BEMS.
V-79027
No Change
Findings ID: | BEMS-00-013700 | Rule ID: | SV-93733r1_rule | Severity: | medium | CCI: | CCI-002361 |
---|
Discussion
A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporary nature of the absence. Rather than relying on the user to manually lock their application session prior to vacating the vicinity, applications need to be able to identify when a user's application session has idled and take action to initiate the session lock.Checks
Verify the BEMS inactivity timeout is set to 15 minutes or less as follows:1. Find the xml file "jetty.xml" located in the BEMS install directory on the BEMS host Windows server.
2. Find the "maxIdleTime" field.
3. Verify it is set to 900 or less (seconds).
If the BEMS inactivity timeout is not set to 15 minutes (900 seconds) or less, this is a finding.
Fix
Configure BEMS with an inactivity timeout of 15 minutes or less.1. Find the xml file "jetty.xml" located in the BEMS install directory on the BEMS host Windows server.
2. Find the "maxIdleTime" field and set it to 900 or less (seconds).
3. Save the file.
4. Restart the BEMS server.
V-79029
No Change
Findings ID: | BEMS-00-013800 | Rule ID: | SV-93735r1_rule | Severity: | medium | CCI: | CCI-000764 |
---|
Discussion
To assure accountability and prevent unauthorized access, organizational users must be identified and authenticated. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors, guest researchers, individuals from allied nations). Users (and any processes acting on behalf of users) are uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization, which outlines specific user actions that can be performed on the information system without identification or authentication.Checks
This requirement is not applicable if the Mail service (Push Notifications support for BlackBerry Work) is not enabled on BEMS.Verify the mail service in BEMS is configured for Windows Authentication for the database connection as follows:
1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Mail".
2. Click "Database".
3. In the "Server" field, type the Microsoft SQL Server host name and instance.
4. In the "Database" field, type the database name.
5. In the Windows Authentication drop-down list, verify "Windows Authentication" is selected.
If "Windows Authentication" is not selected for the mail service database connection, this is a finding.
Fix
Set up Windows Authentication for the database connection for the mail service in BEMS:1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Mail".
2. Click "Database".
3. In the "Server" field, type the Microsoft SQL Server host name and instance.
4. In the "Database" field, type the database name.
5. In the Windows Authentication drop-down list, select "Windows Authentication".
6. Click "Save".
V-79031
No Change
Findings ID: | BEMS-00-013900 | Rule ID: | SV-93737r1_rule | Severity: | medium | CCI: | CCI-000764 |
---|
Discussion
To assure accountability and prevent unauthorized access, organizational users must be identified and authenticated. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors, guest researchers, individuals from allied nations). Users (and any processes acting on behalf of users) are uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization, which outlines specific user actions that can be performed on the information system without identification or authentication.Checks
This requirement is not applicable if the Mail service (Push Notifications support for BlackBerry Work) is not enabled on BEMS.Verify Windows Integrated Authentication for the Exchange connection for the Mail service has been set up in BEMS as follows:
1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Mail".
2. Click "Microsoft Exchange".
3. Under "Enter Service Account Details", verify "Use Windows Integrated Authentication" has been selected.
If Windows Integrated Authentication for the Exchange connection for the Mail service has not been set up in BEMS, this is a finding.
Fix
Set up Windows Integrated Authentication for the Exchange connection for the Mail service in BEMS:1. Log on to BEMS with the service account that will be configured.
2. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Mail".
3. Click "Microsoft Exchange".
4. Under "Enter Service Account Details", select the "Use Windows Integrated Authentication" check box.
5. Click "Save".
V-79033
No Change
Findings ID: | BEMS-00-014000 | Rule ID: | SV-93739r1_rule | Severity: | medium | CCI: | CCI-000068 |
---|
Discussion
Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Layer Security (TLS) or SSL.Checks
This requirement is not applicable if the Mail service (Push Notifications support for BlackBerry Work) is not enabled on BEMS.Verify Enable SSL LDAP for LDAP Lookup for users for the Mail service is configured in BEMS as follows:
1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Mail".
2. Click "User Directory Lookup".
3. If the "Enable LDAP Lookup" has been selected, verify the "Enable SSL LDAP" check box is also selected.
When LDAP Lookup for user has been configured on BEMS, if Enable SSL LDAP is not configured, this is a finding.
Fix
Enable SSL LDAP when using LDAP Lookup for users for the Mail service in BEMS as follows:1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Mail".
2. Click "User Directory Lookup".
3. Select the "Enable LDAP Lookup" check box.
4. Select the "Enable SSL LDAP" check box.
5. Click "Save".
V-79035
No Change
Findings ID: | BEMS-00-014100 | Rule ID: | SV-93741r1_rule | Severity: | medium | CCI: | CCI-000068 |
---|
Discussion
Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Layer Security (TLS) or SSL.Checks
This requirement is not applicable if the Mail service (Push Notifications support for BlackBerry Work) is not enabled on BEMS.Verify Enable SSL LDAP for LDAP Lookup for certificates for the Mail service is configured in BEMS as follows:
1. In the BEMS Dashboard, under BlackBerry Services Configuration, click mail and then click Certificate Directory Lookup
2. If the Enable LDAP Lookup has been selected, verify the Enable SSL LDAP check box is also selected.
When LDAP Lookup for certificates has been configured on BEMS, if Enable SSL LDAP is not configured, this is a finding.
Fix
Enable SSL LDAP when using LDAP Lookup for certificates for the Mail service in BEMS as follows:1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Mail".
2. Click "Certificate Directory Lookup".
3. Select the "Enable LDAP Lookup" check box.
4. Select the "Enable SSL LDAP" check box.
5. Click "Save".
V-79037
No Change
Findings ID: | BEMS-00-014200 | Rule ID: | SV-93743r1_rule | Severity: | medium | CCI: | CCI-000764 |
---|
Discussion
To assure accountability and prevent unauthorized access, organizational users must be identified and authenticated. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors, guest researchers, individuals from allied nations). Users (and any processes acting on behalf of users) are uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization, which outlines specific user actions that can be performed on the information system without identification or authentication.Checks
This requirement is not applicable if the BlackBerry Connect service is not enabled on BEMS.Verify the BlackBerry Connect service in BEMS is configured for Windows Authentication for the database connection as follows:
1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Connect".
2. Click "Database".
3. In the "Database" field, type the database name.
4. In the Windows Authentication drop-down list, verify "Windows Authentication" is selected.
If "Windows Authentication" is not selected for the BlackBerry Connect database connection, this is a finding.
Fix
Set up Windows Authentication for the database connection for the BlackBerry Connect service in BEMS:1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Connect".
2. Click "Database".
3. In the "Database" field, type the database name.
4. In the Windows Authentication drop-down list, select "Windows Authentication".
5. Click "Save".
V-79039
No Change
Findings ID: | BEMS-00-014300 | Rule ID: | SV-93745r1_rule | Severity: | medium | CCI: | CCI-001453 |
---|
Discussion
Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Layer Security (TLS) or SSL. Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD systems or by organizations with insufficient security controls. If the CA used for verifying the certificate is not a DoD-approved CA, trust of this CA has not been established.Checks
This requirement is not applicable if the BlackBerry Connect service is not enabled on BEMS.Verify SSL is enabled for the BlackBerry Connect service and a DoD certificate is used as follows:
1. Browse to FQDN of the BEMS Connect server(s) on port 8082.
2. Click on the SSL certificate to verify it has been issued by the DoD CA.
3. Repeat steps 1 and 2 for each BEMS server that has the Connect service added to it.
If SSL is not enabled for BlackBerry Connect and if the SSL certificate is not a DoD CA issued certificate, this is a finding.
Fix
Configure BlackBerry Connect to enable SSL with a DoD certificate.1. Submit a CSR request to the DoD CA.
2. Import the DoD certificate to the computer that hosts BEMS.
3. Bind the SSL certificate to the Connect SSL port.
4. Add the new certificate information to the BEMS configuration file.
5. Configure BlackBerry Connect to send requests over SSL.
6. Configure Connect to use SSL with BlackBerry Proxy.
V-79041
No Change
Findings ID: | BEMS-00-014400 | Rule ID: | SV-93747r1_rule | Severity: | medium | CCI: | CCI-000764 |
---|
Discussion
To assure accountability and prevent unauthorized access, organizational users must be identified and authenticated. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors, guest researchers, individuals from allied nations). Users (and any processes acting on behalf of users) are uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization, which outlines specific user actions that can be performed on the information system without identification or authentication.Checks
This requirement is not applicable if the BlackBerry Docs service is not enabled on BEMS.Verify the BlackBerry Docs service in BEMS is configured for Windows Authentication for the database connection as follows:
1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Docs".
2. Click "Database".
3. In the "Database" field, type the database name.
4. In the Windows Authentication drop-down list, verify "Windows Authentication" is selected.
If "Windows Authentication" is not selected for the BlackBerry Docs database connection, this is a finding.
Fix
Set up Windows Authentication for the database connection for the BlackBerry Docs service in BEMS:1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Docs".
2. Click "Database".
3. In the "Database" field, type the database name.
4. In the Windows Authentication drop-down list, select "Windows Authentication".
5. Click "Save".
V-79043
No Change
Findings ID: | BEMS-00-014500 | Rule ID: | SV-93749r1_rule | Severity: | medium | CCI: | CCI-000764 |
---|
Discussion
To assure accountability and prevent unauthorized access, organizational users must be identified and authenticated. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors, guest researchers, individuals from allied nations). Users (and any processes acting on behalf of users) are uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization, which outlines specific user actions that can be performed on the information system without identification or authentication.Checks
This requirement is not applicable if the BlackBerry Docs service is not enabled on BEMS.Verify NTLM authentication is enabled for the BlackBerry Docs service as follows:
1. In the BEMS Dashboard, under "Good Services Configuration", click "Docs".
2. Click "Web Proxy".
3. Select "Use Web Proxy".
4. In the Proxy Server Authentication Type drop-down list, verify "NTLM authentication" is selected.
If NTLM authentication is not enabled for the BlackBerry Docs service, this is a finding.
Fix
Configure NTLM authentication for the BlackBerry Docs service as follows:1. In the BEMS Dashboard, under "Good Services Configuration", click "Docs".
2. Click "Web Proxy".
3. Select the "Use Web Proxy".
4. In the Proxy Server Authentication Type drop-down list, select "NTLM authentication".
5. Click "Save".
V-79045
No Change
Findings ID: | BEMS-00-014600 | Rule ID: | SV-93751r1_rule | Severity: | high | CCI: | CCI-001453 |
---|
Discussion
Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptographic mechanism in order to protect the information during transmission. This is usually achieved through the use of Transport Layer Security (TLS) or SSL.Checks
This requirement is not applicable if the BlackBerry Docs service is not enabled on BEMS.Verify the BlackBerry Docs service is configured to use SSL for LDAP Lookup to connect to the Office Web App Server (e.g., SharePoint) as follows:
1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Docs".
2. Click "Settings".
3. Verify "Use SSL for LDAP" is selected.
If SSL for LDAP is not enabled for the BlackBerry Docs service, this is a finding.
Fix
This requirement is not applicable if the BlackBerry Docs service is not enabled on BEMS.Configure the BlackBerry Docs service to use SSL for LDAP Lookup to connect to the Office Web App Server (e.g., SharePoint) as follows:
1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Docs".
2. Click "Settings".
3. Select the "Enable Kerberos Constrained Delegation" check box to allow Docs to use Kerberos constrained delegation.
4. Enter each of the Microsoft SharePoint Online domains you plan to make available.
5. Enter the URL for your approved Office Web App Server.
6. Provide your Microsoft Active Directory user domains (separated by commas) and then enter the corresponding LDAP Port.
7. Select the "Use SSL for LDAP" check box.
8. Click "Save".
V-79047
No Change
Findings ID: | BEMS-00-014700 | Rule ID: | SV-93753r1_rule | Severity: | medium | CCI: | CCI-000067 |
---|
Discussion
Logging must be used in order to track system activity, assist in diagnosing system issues, and provide evidence needed for forensic investigations post security incident.Checks
This requirement is not applicable if the BlackBerry Docs service is not enabled on BEMS.Verify audit logging is enabled for the BlackBerry Docs service as follows:
1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Docs".
2. Click "Audit".
3. On the "Audit Settings" tab, verify "Enable Audit Logs" is selected.
If audit logging is not enabled for the BlackBerry Docs service, this is a finding.
Fix
Enable audit logging for the BlackBerry Docs service as follows:1. In the BEMS Dashboard, under "BlackBerry Services Configuration", click "Docs".
2. Click "Audit".
3. On the "Audit Settings" tab, select the "Enable Audit Logs" check box.
4. Click "Save".