BlackBerry Enterprise Service v10.1.x BlackBerry Device Service STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000370
- Version
- BBDS-00-003120
- Vuln IDs
-
- V-38932
- Rule IDs
-
- SV-50737r2_rule
Checks: C-46487r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether a device unlock password with a minimum length of 4 characters has been enabled. If there are multiple policies, they must all be reviewed. This requirement can be met via one of two methods: Method #1: Train users to set the following device unlock/personal area password feature on a PlayBook 2.0 or BlackBerry 10 device: Navigate to "Options/Settings -> Security ->Password" and set "Enable Password" to "ON". Create a 4-digit passcode for the device lock. **************************************************************************************** Method #2: The BDS IT policy rule "Apply Work Space Password to Full Device" can be applied to force the Work Space password to be used for both Work and Personal Spaces. IT policy rules can be specified per group or per user. To add an IT policy to a group: 1. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side, expand "Group". 2. Click "Manage groups". 3. Click the name of the group. 4. Click "Edit group". 5. Click the "Policies" tab. 6. In the "IT policy list", select the IT policy. 7. Click "Save all". To add an IT policy to a user account: 1. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side, expand "User". 2. Click "Manage users". 3. Search for a user account. 4. In the search results, select the check box for the user account. 5. In the "Add to user configuration" list, click "Set IT policy". 6. In the "IT policy" drop-down list, select the IT policy. 7. Click "Save". For more details and information, see the "Setting up device controls" section of the BlackBerry Enterprise Service 10 BlackBerry Device Service, Version: 10.1.1 Administration Guide.
Fix: F-44020r2_fix
Configure the BlackBerry Device Service server to enable a device unlock password with a minimum length of 4 characters. Method #1: Train users to set a 4-digit device unlock/personal area password feature on a PlayBook 2.0 or BlackBerry 10 device. **************************************************************************************** Method #2: Configure the centrally managed BlackBerry Device Service server policy rule to apply the Work Space password to the entire device.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000370
- Version
- BBDS-00-003131
- Vuln IDs
-
- V-38935
- Rule IDs
-
- SV-50740r2_rule
Checks: C-46421r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether the mobile device applications' ability to reset the device lock timer has been disabled. If there are multiple policies, they must all be reviewed. The "Application Security Timer Reset" rule on the BlackBerry Device Service server specifies whether apps can reset the security timer on a BlackBerry device to prevent the device from locking after either 1) the period of user inactivity that is specified in the Security Timeout rule elapses, or 2) the period of inactivity that the user specifies in the Password Lock settings on the device elapses. If this rule is set to disallow, the device will lock without user interaction when running apps that attempt to reset the security timer, such as apps that display navigation information, slideshows, and videos. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Security" and verify "Application Security Timer Reset" is set to "Disallow". Otherwise, this is a finding.
Fix: F-43891r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disallow mobile device applications the ability to reset the device lock timer.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000370
- Version
- BBDS-00-003176
- Vuln IDs
-
- V-38937
- Rule IDs
-
- SV-50742r2_rule
Checks: C-46422r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether any mobile OS service that connects to a cloud storage server has been disabled. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Software" and verify "Cloud Storage Access from Work Space" is set to "Disallow". Otherwise, this is a finding. Note: The above is applicable for EMM-Corporate (BlackBerry Balance) devices only. Devices with EMM-Corporate (Work Space only) inherently meet this requirement.
Fix: F-43892r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable any mobile OS service that connects to a cloud storage server.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000370
- Version
- BBDS-00-003177
- Vuln IDs
-
- V-38939
- Rule IDs
-
- SV-50744r2_rule
Checks: C-46423r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether all Work Space application traffic is routed through the BlackBerry Device Service server. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Security" and verify "Network Access Control for Work Apps" is set to "Yes". Otherwise, this is a finding.
Fix: F-43896r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to direct all Work Space application traffic through the BlackBerry Device Service server.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-003178
- Vuln IDs
-
- V-38940
- Rule IDs
-
- SV-50745r2_rule
Checks: C-46424r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether Personal Space applications' access to the Work Space network connection has been disallowed. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Security" and verify "Work Network Usage for Personal Apps" is set to "Disallow". Otherwise, this is a finding. NOTE: Check text is applicable for EMM-Corporate (BlackBerry Balance) devices only. This requirement is N/A for EMM-Regulated (Work Space only) devices.
Fix: F-43897r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disallow hyperlinks within Work Space applications from opening within the Personal Space browser application.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-003179
- Vuln IDs
-
- V-38941
- Rule IDs
-
- SV-50746r2_rule
Checks: C-46425r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether hyperlinks within Work Space applications can open within the Personal Space browser application. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Software" and verify "Open Links in Work Email Messages in the Personal Browser" is set to "Disallow". Otherwise, this is a finding.
Fix: F-43898r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disallow Personal Space applications access to the Work Space network connection.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000370
- Version
- BBDS-00-003180
- Vuln IDs
-
- V-38943
- Rule IDs
-
- SV-50748r1_rule
Checks: C-46426r1_chk
Review the BlackBerry Device Service server configuration to determine whether there is administrative functionality to centrally manage the managed mobile device security policy rule to set the number of allowed repeated characters in the mobile device unlock password. If this function is not present, this is a finding. This requirement can be met via one of two methods: Method #1: Train users to set the following device unlock/personal area password feature on a PlayBook 2.0 or BlackBerry 10 device: Navigate to "Options -> Security ->Password" and set "Enable Password" is set to "ON". Create a 4 digit passcode for the device lock that does not contain any repeated characters. **************************************************************************************** Method #2: The BDS IT policy rule "Apply Work Space Password to Full Device" can be applied to force the work space password to be used for both work and personal personas. IT policy rules can be specified per group or per user. To add an IT policy to a group: 1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand Group. 2. Click Manage groups. 3. Click the name of the group. 4. Click Edit group. 5. Click the Policies tab. 6. In the IT policy list, select the IT policy. 7. Click Save all. To add an IT policy to a user account: 1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand User. 2. Click Manage users. 3. Search for a user account. 4. In the search results, select the check box for the user account. 5. In the Add to user configuration list, click Set IT policy. 6. In the IT policy drop-down list, select the IT policy. 7. Click Save. For more details and information, please see the “Setting up device controls” section of the BlackBerry Enterprise Service 10 BlackBerry Device Service, Version: 6.2 Administration Guide.
Fix: F-43899r1_fix
Method #1: Train users to set a 4-digit device unlock/personal area password that does not contain any repeated characters on a PlayBook 2.0 or BlackBerry 10 device. **************************************************************************************** Method #2: Configure the centrally managed BlackBerry Device Service server security policy rule to apply the work space password to the entire device.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000370
- Version
- BBDS-00-003185
- Vuln IDs
-
- V-38946
- Rule IDs
-
- SV-50751r1_rule
Checks: C-46427r1_chk
Review the BlackBerry Device Service server configuration to determine whether there is administrative functionality to centrally manage the managed mobile device security policy rule to disallow sequential numbers in the mobile device unlock password. If this function is not present, this is a finding. This requirement can be met via one of two methods: Method #1: Train users to set the following device unlock/personal area password feature on a PlayBook 2.0 or BlackBerry 10 device: Navigate to "Options -> Security ->Password" and set "Enable Password" is set to "ON". Create a 4 digit passcode for the device lock that does not contain any sequential numbers. **************************************************************************************** Method #2: The BDS IT policy rule "Apply Work Space Password to Full Device" can be applied to force the work space password to be used for both work and personal personas. IT policy rules can be specified per group or per user. To add an IT policy to a group: 1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand Group. 2. Click Manage groups. 3. Click the name of the group. 4. Click Edit group. 5. Click the Policies tab. 6. In the IT policy list, select the IT policy. 7. Click Save all. To add an IT policy to a user account: 1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand User. 2. Click Manage users. 3. Search for a user account. 4. In the search results, select the check box for the user account. 5. In the Add to user configuration list, click Set IT policy. 6. In the IT policy drop-down list, select the IT policy. 7. Click Save. For more details and information, please see the “Setting up device controls” section of the BlackBerry Enterprise Service 10 BlackBerry Device Service, Version: 6.2 Administration Guide.
Fix: F-43902r1_fix
Method #1: Train users to set a 4-digit device unlock/personal area password that does not contain any sequential numbers on a PlayBook 2.0 or BlackBerry 10 device. **************************************************************************************** Method #2: Configure the centrally managed BlackBerry Device Service server security policy rule to apply the work space password to the entire device.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000370
- Version
- BBDS-00-002541
- Vuln IDs
-
- V-38948
- Rule IDs
-
- SV-50753r2_rule
Checks: C-46429r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether copying data from inside a non-secure data area on a mobile device into the security container has been disabled. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Security" and verify "Work App Access to Shared Files in the Personal Space" is set to "Disallow". Otherwise, this is a finding. NOTE: Check text is applicable for EMM-Corporate (BlackBerry Balance) devices only. This requirement is N/A for EMM-Regulated (Work Space only) devices.
Fix: F-43905r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable copying data from inside a non-secure data area on a mobile device into the security container.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000370
- Version
- BBDS-00-002542
- Vuln IDs
-
- V-38949
- Rule IDs
-
- SV-50754r2_rule
Checks: C-46430r3_chk
Review the BlackBerry Device Service server policy configuration to determine whether only work persona contacts can be read from a native personal persona application. If there are multiple policies, they must all be reviewed. The "Personal Apps Access to Work Contacts" rule on the BlackBerry Device Service server specifies whether personal apps can access work contacts on a BlackBerry device. If this rule is set to Only RIM Apps, some apps developed by Research In Motion (BlackBerry Messenger, Text Messages, visual voice mail, and voice dialing) can access work contacts. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Security" and verify "Personal Apps Access to Work Contacts" is set to "Only RIM Apps". Otherwise, this is a finding. NOTE: Check text is applicable for EMM-Corporate (BlackBerry Balance) devices only. This requirement is N/A for EMM-Regulated (Work Space only) devices.
Fix: F-43906r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to allow only work persona contacts to be read from a native personal space application.
- RMF Control
- AC-5
- Severity
- H
- CCI
- CCI-000037
- Version
- BBDS-00-000100
- Vuln IDs
-
- V-38951
- Rule IDs
-
- SV-50756r2_rule
Checks: C-46432r2_chk
Review the BlackBerry Device Service server configuration to ensure there are accounts associated with the following roles: Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Administrator users > Manage users > <User Name> > Roles" and verify the roles required by the site are assigned. Otherwise, this is a finding. Note: The roles in BlackBerry Device services are as follows: Security Administrator - This role has permission to perform all tasks in the BlackBerry Device Service. Enterprise Administrator - This role has permission to perform all tasks in the BlackBerry Device Service except changing role assignments. This role can only view role assignments. Senior Helpdesk Administrator - This role has permission to perform advanced administrative tasks in the BlackBerry Device Service. Junior Helpdesk Administrator - This role has permission to perform basic administrative tasks in the BlackBerry Device Service. Server Only Administrator - This role has permissions to perform system management tasks in the BlackBerry Device Service. User Only Administrator - This role has permission to perform user management tasks in the BlackBerry Device Service.
Fix: F-43908r1_fix
Create and configure accounts to be aligned with the following roles: - MDM administrative account administrator: responsible for server installation, initial configuration, and maintenance functions. - Security configuration policy administrator (IA technical professional): responsible for security configuration of the server and setting up and maintenance of mobile device security policies. - Device management administrator (Technical operator): responsible for maintenance of mobile device accounts, including setup, change of account configurations, and account deletion. - Auditor (internal auditor or reviewer): responsible for reviewing and maintaining server and mobile device audit logs.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-000345
- Version
- BBDS-00-000105
- Vuln IDs
-
- V-38952
- Rule IDs
-
- SV-50757r1_rule
Checks: C-46433r1_chk
The BlackBerry Device Service server has the capability to deploy mobile operation system and application updates via an over-the-air (OTA) session. Specific versions of applications can be sent to the device, or applications can be updated. OS updates are made available to the user for download. The user is notified when new updates are available. Create a software configuration: 1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand Software. 2. Click Create a software configuration. 3. In the Configuration information section, in the Name field, type a name for the software configuration. 4. Click Save. Add an app to a software configuration: You must add an app to a software configuration to send the app to BlackBerry devices. If you want to upgrade an app, you must add the new version of the app to the appropriate software configuration. 1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand Software. 2. Click Manage software configurations. 3. Click the software configuration that you want to add an app to. 4. Click Edit software configuration. 5. On the Applications tab, click Add applications to software configuration. 6. Search for the app that you want to add to the software configuration. 7. In the search results, select an app that you want to add to the software configuration. 8. For apps in the applications repository, in the Disposition drop-down list for the app, perform one of the following actions: * To install the app automatically on devices, and to prevent users from removing the app, select Required. * To permit users to install and remove the app, and to add the app to the Work tab in the BlackBerry World storefront, select Optional. 9. Repeat steps 6 to 8 for each app that you want to add to the software configuration. 10. Click Add to software configuration. 11. Click Save all. See the "Managing app availability on devices" section of the BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 6.2 Administration Guide for further details and other available options. If the BlackBerry Device Service server cannot be configured to send MOS and MAP updates OTA, this is a finding.
Fix: F-43909r1_fix
Configure the BlackBerry Device Service server to deploy MOS and MAP updates via an OTA session.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000370
- Version
- BBDS-00-000115
- Vuln IDs
-
- V-38954
- Rule IDs
-
- SV-50759r1_rule
Checks: C-46435r2_chk
Detailed Policy Requirements: 1. Separate STIG compliant IT policies will be set up on the BDS server: one for users that have been issued an approved Bluetooth headset/hands free device and one for users that have not been issued an approved Bluetooth headset/hands free device. 2. All user accounts will be assigned to a STIG compliant IT policy. Check Procedures: Interview the BlackBerry system administrator. Ask the administrator to identify the default IT policy on the BDS (usually labeled "Default" and any other non-STIG compliant IT policies set up on the BDS. View the list of IT policies set up on the BDS as follows: BDS -> BlackBerry solution management -> Policy -> Manage IT Policies Verify no users are assigned the default IT Policy or any other non-STIG IT policy by performing the following steps for each policy. For the default IT policy and other non-STIG IT policies, look at each IT policy listed under "Manage IT policies" to be checked. - Click on the policy name. - Click on "View Users with reconciled IT Policy." - A list of all users assigned to the selected IT policy will be shown. - Determine if any user has been assigned to the default IT Policy or any other non-STIG IT policy. If yes, this is a finding.
Fix: F-43911r1_fix
User accounts will only be assigned a STIG compliant IT policy.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-001144
- Version
- BBDS-00-000132
- Vuln IDs
-
- V-38959
- Rule IDs
-
- SV-50764r2_rule
Checks: C-46439r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether the encryption algorithms used to encrypt S/MIME protected email messages are 3DES or AES-256. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Profiles > Manage email profiles > <Profile Name> > Email profile settings" and verify "Allowed content ciphers" is set to "AES (256-bit)", or "Triple DES". Otherwise, this is a finding.
Fix: F-43915r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to specify the encryption algorithms used to encrypt S/MIME protected email messages.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000155
- Vuln IDs
-
- V-38964
- Rule IDs
-
- SV-50769r2_rule
Checks: C-46444r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether Bluetooth Discoverable Mode has been disabled. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify "Bluetooth Discoverable Mode" is set to "Disallow". Otherwise, this is a finding. Note: Check text is applicable for devices with EMM-Regulated (Work Space only).
Fix: F-43920r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable Bluetooth Discoverable Mode.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000370
- Version
- BBDS-00-000156
- Vuln IDs
-
- V-38965
- Rule IDs
-
- SV-50770r1_rule
Checks: C-46445r1_chk
Review the BlackBerry Device Service server configuration to determine whether there is administrative functionality to enable or disable the transfer of any file-based data via Bluetooth. If this function is not present, this is a finding. The "Transfer Work Contacts Using Bluetooth PBAP or HFP" rule on the BlackBerry Device Service server specifies whether a BlackBerry device can send work contacts to another Bluetooth enabled device using the Bluetooth PBAP or HFP. If this rule is set to disallow, users cannot transfer work contacts using Bluetooth PBAP or HFP. Setting this rule to disallow also prevents users from transferring work messages using the Bluetooth MAP. The "Transfer Work Files Using Bluetooth OPP" rule on the BlackBerry Device Service server specifies whether a BlackBerry device can send work files and objects such as contacts to another Bluetooth-enabled or NFC-enabled device using the Bluetooth OPP. IT policy rules can be specified per group or per user. To add an IT policy to a group: 1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand Group. 2. Click Manage groups. 3. Click the name of the group. 4. Click Edit group. 5. Click the Policies tab. 6. In the IT policy list, select the IT policy. 7. Click Save all. To add an IT policy to a user account: 1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand User. 2. Click Manage users. 3. Search for a user account. 4. In the search results, select the check box for the user account. 5. In the Add to user configuration list, click Set IT policy. 6. In the IT policy drop-down list, select the IT policy. 7. Click Save. For more details and information, please see the "Setting up device controls" section of the BlackBerry Enterprise Service 10 BlackBerry Device Service, Version: 6.2 Administration Guide.
Fix: F-43921r1_fix
Configure the centrally managed BlackBerry Device Service server security policy rule to enable or disable the transfer of any file-based data via Bluetooth.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000160
- Vuln IDs
-
- V-38966
- Rule IDs
-
- SV-50771r2_rule
Checks: C-46446r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether Bluetooth pairing using a randomly generated passkey size of at least 8 digits has been enabled. If there are multiple policies, they must all be reviewed. The "Enforce Minimum Bluetooth Passkey Length" rule on the BlackBerry Device Service server specifies whether a BlackBerry device can connect to another Bluetooth-enabled device if the passkey that the Bluetooth-enabled device requests from or provides to the BlackBerry device is less than 8 digits. If this rule is set to Yes, the BlackBerry device cannot connect to another Bluetooth-enabled device if the passkey that the Bluetooth-enabled device requests from or provides to the BlackBerry device is less than 8 digits. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify "Enforce Minimum Bluetooth Passkey Length" is set to "Yes". Otherwise, this is a finding. Note: Check text is applicable for devices with EMM-Regulated (Work Space only).
Fix: F-43922r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to enable Bluetooth pairing using a randomly generated passkey size of at least 8 digits.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000165
- Vuln IDs
-
- V-38967
- Rule IDs
-
- SV-50772r2_rule
Checks: C-46447r2_chk
Review the BlackBerry Device Service server configuration to determine whether Bluetooth 128-bit encryption is enabled. If there are multiple policies, they must all be reviewed. The "Minimum Bluetooth Encryption Key Length" rule on the BlackBerry Device Service server specifies the minimum encryption key length that a BlackBerry device uses to encrypt Bluetooth connections. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify "Minimum Bluetooth Encryption Key Length" is set to "16 Bytes". Otherwise, this is a finding. Note: Check text is applicable for devices with EMM-Regulated (Work Space only).
Fix: F-43923r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to enable Bluetooth 128-bit encryption.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000200
- Vuln IDs
-
- V-38992
- Rule IDs
-
- SV-50797r2_rule
Checks: C-46455r2_chk
Verify the BlackBerry Administration Service (BAS) has been configured to permit users to activate new BlackBerry devices only. Log into the BAS as an administrator with Security Administrator role. Under "Organization Administration", expand "Organization". - Click "My organization". - Click the "BlackBerry Web Desktop Manager Information" tab. - On the "Allowed user operations", verify "Allow user wireline activation:" is set to "Activate unused PIN only." This is a finding if not set as required.
Fix: F-43948r2_fix
Configure BlackBerry Administration Service to permit users to activate new BlackBerry devices only via BlackBerry Web Desktop Manager.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000230
- Vuln IDs
-
- V-39012
- Rule IDs
-
- SV-50817r2_rule
Checks: C-46461r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether the number of incorrect password attempts before a data wipe procedure is initiated is set to 10. If there are multiple policies, they must all be reviewed. The "Maximum Password Attempt" rule allows the administrator to enforce data wipe upon maximum number of incorrect passwords. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Password" and verify "Maximum Password Attempts" is set to "10." Otherwise, this is a finding.
Fix: F-43968r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to set the number of incorrect password attempts before a data wipe procedure is initiated to 10.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000235
- Vuln IDs
-
- V-39013
- Rule IDs
-
- SV-50818r2_rule
Checks: C-46462r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether a Work Space password has been enabled. If there are multiple policies, they must all be reviewed. The "Password Required for Work Space" rule specifies whether a BlackBerry device requires a password for the Work Space. If this rule is set to Yes, a BlackBerry device user must set a password for the Work Space on the device. For devices with the BlackBerry PlayBook OS, if this rule is not set, a default value of "No" will be used. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Password" and verify "Password Required for Work Space" is set to "Yes." Otherwise, this is a finding. Note: The above is only for devices with EMM-Corporate (BlackBerry Balance) devices. This check is not applicable to EMM-Regulated (Work Space only) devices.
Fix: F-43969r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to enable a Work Space password.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000240
- Vuln IDs
-
- V-39014
- Rule IDs
-
- SV-50819r2_rule
Checks: C-46463r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether the number of uppercase letters in the Work Space password is at least one. If there are multiple policies, they must all be reviewed. The "Minimum Password Complexity" rule allows the administrator of the BlackBerry Device Service server to force at least 1 uppercase letter in the device unlock password. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Password" and verify "Password Complexity" is set to "At least one uppercase letter, one lowercase letter, one number, and one special character". Otherwise, this is a finding.
Fix: F-43970r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to set the number of uppercase letters in the Work Space password to at least one.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000245
- Vuln IDs
-
- V-39015
- Rule IDs
-
- SV-50820r2_rule
Checks: C-46464r3_chk
Review the BlackBerry Device Service server policy configuration to determine whether the number of numbers in the Work Space password is at least one. If there are multiple policies, they must all be reviewed. The "Minimum Password Complexity" rule allows the administrator of the BlackBerry Device Service server to force at least one number in the device unlock password. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Password" and verify "Password Complexity" is set to "At least one uppercase letter, one lowercase letter, one number, and one special character." Otherwise, this is a finding.
Fix: F-43971r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to set the number of numbers in the Work Space password to at least one.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000260
- Vuln IDs
-
- V-39018
- Rule IDs
-
- SV-50823r2_rule
Checks: C-46467r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether the Work Space password length is at least eight characters. If there are multiple policies, they must all be reviewed. The "Minimum Password Length" rule enforces a minimum number of characters for the device password. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Password" and verify "Minimum Password Length" is set to "8". Otherwise, this is a finding.
Fix: F-43975r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to set the Work Space password length of eight or more characters.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000270
- Vuln IDs
-
- V-39022
- Rule IDs
-
- SV-50827r2_rule
Checks: C-46469r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether the Work Space inactivity timeout is set to 15 minutes. If there are multiple policies, they must all be reviewed. The "Security Timeout" rule forces the Work Space to lock after a specified period of inactivity. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Password" and verify "Security Timeout" is set to "15 minutes". Otherwise, this is a finding.
Fix: F-43978r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to set the Work Space inactivity timeout to 15 minutes.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000275
- Vuln IDs
-
- V-39023
- Rule IDs
-
- SV-50828r2_rule
Checks: C-46470r2_chk
Review the BlackBerry Device Service server configuration to ensure the BlackBerry Device Service server is configured to restrict the download of software within the Work Space to DoD-approved sources only (e.g., DoD-operated mobile device application store or BlackBerry Device Service server). Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Security" and verify "Restrict Development Mode" is set to "Yes". Otherwise, this is a finding. Note: The above is only for EMM-Corporate (BlackBerry Balance) devices. EMM-Regulated (Work Space only) devices inherently meet this requirement.
Fix: F-43979r2_fix
Configure the BlackBerry Device Service server to restrict the download of software within the Work Space to DoD-approved sources only.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000386
- Version
- BBDS-00-000285
- Vuln IDs
-
- V-39026
- Rule IDs
-
- SV-50831r2_rule
Checks: C-46472r2_chk
Review the BlackBerry Device Service server configuration to ensure the BlackBerry Administration Service (BAS) has been configured to disable users from performing administrative tasks on the BlackBerry Device Service server. Log into the BlackBerry Administration Service as an administrator with a Security Administrator role. Under "Organization Administration", expand "Organization". - Click "My organization". - Click the "BlackBerry Web Desktop Manager Information" tab. - On the "Allowed user operations", verify "Allow users to perform self service tasks:" is set to No. If not set as required, this is a finding.
Fix: F-43982r1_fix
Configure the BlackBerry Administration Service to disable a user from performing self-service tasks via BlackBerry Web Desktop Manager.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000386
- Version
- BBDS-00-000286
- Vuln IDs
-
- V-39027
- Rule IDs
-
- SV-50832r2_rule
Checks: C-46473r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether a user-initiated backup or restore of the Work Space of a managed mobile device has been disabled. If there are multiple policies, they must all be reviewed. For EMM-Corporate (BlackBerry Balance) devices, log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Security" and verify "Backup and Restore Work Space" is set to "Disallow". Otherwise, this is a finding. For EMM-Regulated (Work Space only) devices, log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Security" and verify "Backup and Restore Device" is set to "Disallow". Otherwise, this is a finding.
Fix: F-43983r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disallow a user initiated backup or restore of the Work Space of a managed mobile device.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000386
- Version
- BBDS-00-000287
- Vuln IDs
-
- V-39028
- Rule IDs
-
- SV-50833r2_rule
Checks: C-46474r2_chk
Review the BlackBerry Device Service server policy configuration to determine whether any native applications pertaining to billing on a managed mobile device have been disallowed. If there are multiple policies, they must all be reviewed. The "Wireless Service Provider Billing" rule prevents users from buying wireless service plans that are available from the Plans app. If this rule is set to Disallow, the Wireless Service Provider Billing is disabled on the device. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > General" and verify "Wireless Service Provider Billing" is set to "Disallow". Otherwise, this is a finding.
Fix: F-43985r2_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disallow any native applications pertaining to billing on a managed mobile device.
- RMF Control
- CM-7
- Severity
- L
- CCI
- CCI-000386
- Version
- BBDS-00-000288
- Vuln IDs
-
- V-39029
- Rule IDs
-
- SV-50834r1_rule
Checks: C-46475r1_chk
Review the BlackBerry Device Service server configuration to determine whether there is administrative functionality to disallow any native applications pertaining to billing on a managed mobile device. If this function is not present, this is a finding. The "Wireless Service Provider Billing" rule specifies whether a BlackBerry device user can purchase paid apps from the BlackBerry World storefront and the BlackBerry World for Work storefront using the purchasing plan for your organization's wireless service provider. If this rule is set to disallow, users must pay for app purchases using another payment method. IT policy rules can be specified per group or per user. To add an IT policy to a group: 1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand Group. 2. Click Manage groups. 3. Click the name of the group. 4. Click Edit group. 5. Click the Policies tab. 6. In the IT policy list, select the IT policy. 7. Click Save all. To add an IT policy to a user account: 1. In the BlackBerry Administration Service, on the BlackBerry solution management menu, expand User. 2. Click Manage users. 3. Search for a user account. 4. In the search results, select the check box for the user account. 5. In the Add to user configuration list, click Set IT policy. 6. In the IT policy drop-down list, select the IT policy. 7. Click Save. For more details and information, please see the "Setting up device controls" section of the BlackBerry Enterprise Service 10 BlackBerry Device Service, Version: 6.2 Administration Guide
Fix: F-43986r1_fix
Configure the centrally managed BlackBerry Device Service server security policy rule to disallow any native applications pertaining to billing on a managed mobile device.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000770
- Version
- BBDS-00-000290
- Vuln IDs
-
- V-39031
- Rule IDs
-
- SV-50836r2_rule
Checks: C-46476r3_chk
Review the BlackBerry Device Service server configuration to ensure the system is authenticating through the Enterprise Authentication Mechanism that requires administrators to be authenticated with an individual authenticator prior to using a group authenticator. To ensure correct configuration, have the BlackBerry Device Service (BDS) Administrator log on to the BDS Server and ensure authentication was performed via Active Directory. If access to the server is not being authenticated via this method, this is a finding. To configure the BDS server to authenticate via Active Directory, the following process can be used: Local authentication rules are handled by the host operating system. Remote connection via web browser can be configured to use Microsoft Active Directory authentication during the installation of the BlackBerry Device Server. Configure permissions for the service account: The service account is a Windows account that runs the services for the BlackBerry Device Service. On the computer that you want to install the BlackBerry Device Service on, you must configure permissions for the service account. Without the correct permissions, the BlackBerry Device Service cannot run. If your organization's environment includes the BlackBerry Enterprise Server, you can use the BlackBerry Enterprise Server service account to install the BlackBerry Device Service. If you do not have a BlackBerry Enterprise Server service account, in Microsoft Active Directory, create a service account that you name BDSAdmin. During the installation of the BlackBerry Device Service, steps 16 and 17 describe the setup of the Active Directory login, as follows: 16. In the Microsoft Active Directory settings dialog box, specify information for the reader account that the BlackBerry Administration Service uses to authenticate with Microsoft Active Directory. By default, the setup application uses the service account that you used in step 1. If you want to use a different account as the reader account, you must specify the username, password, and Windows domain for a Microsoft Active Directory account. The account must have permission to read the user information that is stored in the global catalog servers that the BlackBerry Administration Service can access. 17. In the Create an administrator account dialog box, perform one of the following actions: * If you select Use Microsoft Active Directory authentication, you can choose to use the Microsoft Active Directory account that you used in step 16, or you can specify the username and Windows domain for a different Microsoft Active Directory account. * If you select Use BlackBerry Administration Service authentication, type and confirm a password for the BlackBerry Administration Service administrator account. You use the account information that you specify to log in to the BlackBerry Administration Service for the first time. Log in to the BlackBerry Administration Service: When you install the BlackBerry Administration Service, you specify the credentials that you use to log in to the BlackBerry Administration Service for the first time. 1. In the browser, type "https://<server_name>/webconsole/login", where <server_name> is the name of the computer that hosts the BlackBerry Administration Service. 2. In the "User name" field, type your username. 3. In the "Password" field, type your password. 4. Perform one of the following actions: * In the "Log in using" drop-down list, click "BlackBerry Administration Service". * In the "Log in using" drop-down list, click "Active Directory" and type the Microsoft Active Directory domain in the "Domain" field. 5. Click "Log in". 6. Install the RIMWebComponents.cab add-on if you are prompted to do so. For further details regarding the BlackBerry Device Service Installation and configuration, see the accompanying Overview Document, and the "Install the BlackBerry Device Service software" section of the BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 6.2, Installation and Configuration Guide.
Fix: F-43987r1_fix
Configure the BlackBerry Device Service server to authenticate through the Enterprise Authentication Mechanism prior to performing group authentication.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000774
- Version
- BBDS-00-000295
- Vuln IDs
-
- V-39032
- Rule IDs
-
- SV-50837r2_rule
Checks: C-46477r3_chk
Review the BlackBerry Device Service server configuration to ensure the system is authenticating through the Enterprise Authentication Mechanism that employs replay-resistant features. To ensure correct configuration, have the BlackBerry Device Service (BDS) Administrator log on to the BDS Server and ensure authentication was performed via Active Directory. If access to the server is not being authenticated via this method, this is a finding. To configure the BDS server to authenticate via Active Directory, the following process can be used: Local authentication rules are handled by the host operating system. Remote connection via web browser can be configured to use Microsoft Active Directory authentication during the installation of the BlackBerry Device Server. Configure permissions for the service account: The service account is a Windows account that runs the services for the BlackBerry Device Service. On the computer that you want to install the BlackBerry Device Service on, you must configure permissions for the service account. Without the correct permissions, the BlackBerry Device Service cannot run. If your organization's environment includes the BlackBerry Enterprise Server, you can use the BlackBerry Enterprise Server service account to install the BlackBerry Device Service. If you do not have a BlackBerry Enterprise Server service account, in Microsoft Active Directory, create a service account that you name BDSAdmin. During the installation of the BlackBerry Device Service, steps 16 and 17 describe the setup of the Active Directory login, as follows: 16. In the Microsoft Active Directory settings dialog box, specify information for the reader account that the BlackBerry Administration Service uses to authenticate with Microsoft Active Directory. By default, the setup application uses the service account that you used in step 1. If you want to use a different account as the reader account, you must specify the username, password, and Windows domain for a Microsoft Active Directory account. The account must have permission to read the user information that is stored in the global catalog servers that the BlackBerry Administration Service can access. 17. In the Create an administrator account dialog box, perform one of the following actions: * If you select Use Microsoft Active Directory authentication, you can choose to use the Microsoft Active Directory account that you used in step 16, or you can specify the username and Windows domain for a different Microsoft Active Directory account. * If you select Use BlackBerry Administration Service authentication, type and confirm a password for the BlackBerry Administration Service administrator account. You use the account information that you specify to log in to the BlackBerry Administration Service for the first time. Log in to the BlackBerry Administration Service: When you install the BlackBerry Administration Service, you specify the credentials that you use to log in to the BlackBerry Administration Service for the first time. 1. In the browser, type "https://<server_name>/webconsole/login", where <server_name> is the name of the computer that hosts the BlackBerry Administration Service. 2. In the "User name" field, type your username. 3. In the "Password" field, type your password. 4. Perform one of the following actions: * In the "Log in using" drop-down list, click "BlackBerry Administration Service". * In the "Log in using" drop-down list, click "Active Directory" and type the Microsoft Active Directory domain in the "Domain" field. 5. Click "Log in". 6. Install the RIMWebComponents.cab add-on if you are prompted to do so. For further details regarding the BlackBerry Device Service Installation and configuration, see the accompanying Overview Document, and the "Install the BlackBerry Device Service software" section of the BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 6.2, Installation and Configuration Guide.
Fix: F-43989r1_fix
Configure the BlackBerry Device Service server to authenticate through the Enterprise Authentication Mechanism.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000781
- Version
- BBDS-00-000300
- Vuln IDs
-
- V-39035
- Rule IDs
-
- SV-50840r2_rule
Checks: C-46478r4_chk
Verify the site has configured the BDS to require trusted connections to push enclave applications or web servers, using the following procedure. Log into BlackBerry Administration Service, and under "Servers and components" on the left side of the screen, navigate to "'BlackBerry Solution topology > BlackBerry Domain > Component view > MDS Connection Service > <MDS Connection Service Instance>". - On the "Instance information" tab, click "Edit instance". - In the "Access control" section, verify "Push authentication:" is set to "Yes". If not set as required, this is a finding.
Fix: F-43991r1_fix
Configure the BlackBerry Device Service server to push content to BlackBerry devices.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- BBDS-00-000305
- Vuln IDs
-
- V-39036
- Rule IDs
-
- SV-50841r2_rule
Checks: C-46479r3_chk
Review the BlackBerry Device Service server configuration to ensure the system is authenticating through the Enterprise Authentication Mechanism. To ensure correct configuration, have the BlackBerry Device Service (BDS) Administrator log on to the BDS Server and ensure authentication was performed via Active Directory. If access to the server is not being authenticated via this method, this is a finding. To configure the BDS server to authenticate via Active Directory, the following process can be used: Local authentication rules are handled by the host operating system. Remote connection via web browser can be configured to use Microsoft Active Directory authentication during the installation of the BlackBerry Device Server. Configure permissions for the service account: The service account is a Windows account that runs the services for the BlackBerry Device Service. On the computer that you want to install the BlackBerry Device Service on, you must configure permissions for the service account. Without the correct permissions, the BlackBerry Device Service cannot run. If your organization's environment includes the BlackBerry Enterprise Server, you can use the BlackBerry Enterprise Server service account to install the BlackBerry Device Service. If you do not have a BlackBerry Enterprise Server service account, in Microsoft Active Directory, create a service account that you name BDSAdmin. During the installation of the BlackBerry Device Service, steps 16 and 17 describe the setup of the Active Directory login, as follows: 16. In the Microsoft Active Directory settings dialog box, specify information for the reader account that the BlackBerry Administration Service uses to authenticate with Microsoft Active Directory. By default, the setup application uses the service account that you used in step 1. If you want to use a different account as the reader account, you must specify the username, password, and Windows domain for a Microsoft Active Directory account. The account must have permission to read the user information that is stored in the global catalog servers that the BlackBerry Administration Service can access. 17. In the Create an administrator account dialog box, perform one of the following actions: * If you select Use Microsoft Active Directory authentication, you can choose to use the Microsoft Active Directory account that you used in step 16, or you can specify the username and Windows domain for a different Microsoft Active Directory account. * If you select Use BlackBerry Administration Service authentication, type and confirm a password for the BlackBerry Administration Service administrator account. You use the account information that you specify to log in to the BlackBerry Administration Service for the first time. Log in to the BlackBerry Administration Service: When you install the BlackBerry Administration Service, you specify the credentials that you use to log in to the BlackBerry Administration Service for the first time. 1. In the browser, type "https://<server_name>/webconsole/login", where <server_name> is the name of the computer that hosts the BlackBerry Administration Service. 2. In the "User name" field, type your username. 3. In the "Password" field, type your password. 4. Perform one of the following actions: * In the "Log in using" drop-down list, click "BlackBerry Administration Service". * In the "Log in using" drop-down list, click "Active Directory" and type the Microsoft Active Directory domain in the "Domain" field. 5. Click "Log in". 6. Install the RIMWebComponents.cab add-on if you are prompted to do so. For further details regarding the BlackBerry Device Service Installation and configuration, see the accompanying Overview Document, and the "Install the BlackBerry Device Service software" section of the BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 6.2, Installation and Configuration Guide.
Fix: F-43992r2_fix
Configure the BlackBerry Device Service server to support administrator authentication to the server via the Enterprise Authentication Mechanism's authentication.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000186
- Version
- BBDS-00-000310
- Vuln IDs
-
- V-39037
- Rule IDs
-
- SV-50842r2_rule
Checks: C-46480r3_chk
Review the BlackBerry Device Service server configuration to ensure key store password for the certificate that the BlackBerry Administration Service (BAS) and BlackBerry Web Desktop Manager (BWDM) use has been changed from the default. When the BlackBerry Administration Service is installed, the setup application generates a password for the web.keystore file. The web.keystore file stores the SSL certificate that the BlackBerry Administration Service uses to authenticate with browsers. You can change the web keystore password after the installation process completes. All BlackBerry Administration Service instances in a BlackBerry Device Service domain must use the same web keystore password. Consult the system administrator to determine whteher the default password was changed. If the default password has not been changed, this is a finding. To change the web.keystore password, use the following procedure: Before you begin: To verify the current password for the web.keystore file, log in to the BlackBerry Administration Service using an administrator account with the Security Administrator role. Under "Servers and components" on the left side, navigate to "BlackBerry Solution topology > BlackBerry Domain> Component view > BlackBerry Administration Service", and check the "Security settings" section. 1. From the Windows machine with BlackBerry Enterprise Service 10, navigate to "Start > All Programs > BlackBerry Enterprise Service 10" and open "Configuration Tool for BlackBerry Enterprise Service 10". 2. On the "Administration Service - Web Keystore" tab, type the current password. 3. Type a new password and confirm the new password. 4. Click "OK". 5. In the Windows Services, restart the BlackBerry Administration Service services. 6. Repeat steps 1 to 5 on each computer that hosts a BlackBerry Administration Service instance.
Fix: F-43994r1_fix
Change the key store password for the certificate that the BlackBerry Administration Service (BAS) and BlackBerry Web Desktop Manager (BWDM) use from the default.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- BBDS-00-000315
- Vuln IDs
-
- V-39038
- Rule IDs
-
- SV-50843r2_rule
Checks: C-46481r2_chk
Review the BlackBerry Device Service server configuration to ensure the system is authenticating through the Enterprise Authentication Mechanism that utilizes a cryptographic module meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication. To ensure correct configuration, have the BlackBerry Device Service (BDS) Administrator log on to the BDS Server and ensure authentication was performed via Active Directory. If access to the server is not being authenticated via this method, this is a finding. To configure the BDS server to authenticate via Active Directory, the following process can be used: Local authentication rules are handled by the host operating system. Remote connection via web browser can be configured to use Microsoft Active Directory authentication during the installation of the BlackBerry Device Server. Configure permissions for the service account: The service account is a Windows account that runs the services for the BlackBerry Device Service. On the computer that you want to install the BlackBerry Device Service on, you must configure permissions for the service account. Without the correct permissions, the BlackBerry Device Service cannot run. If your organization's environment includes the BlackBerry Enterprise Server, you can use the BlackBerry Enterprise Server service account to install the BlackBerry Device Service. If you do not have a BlackBerry Enterprise Server service account, in Microsoft Active Directory, create a service account that you name BDSAdmin. During the installation of the BlackBerry Device Service, steps 16 and 17 describe the setup of the Active Directory login, as follows: 16. In the Microsoft Active Directory settings dialog box, specify information for the reader account that the BlackBerry Administration Service uses to authenticate with Microsoft Active Directory. By default, the setup application uses the service account that you used in step 1. If you want to use a different account as the reader account, you must specify the username, password, and Windows domain for a Microsoft Active Directory account. The account must have permission to read the user information that is stored in the global catalog servers that the BlackBerry Administration Service can access. 17. In the Create an administrator account dialog box, perform one of the following actions: * If you select Use Microsoft Active Directory authentication, you can choose to use the Microsoft Active Directory account that you used in step 16, or you can specify the username and Windows domain for a different Microsoft Active Directory account. * If you select Use BlackBerry Administration Service authentication, type and confirm a password for the BlackBerry Administration Service administrator account. You use the account information that you specify to log in to the BlackBerry Administration Service for the first time. Log in to the BlackBerry Administration Service: When you install the BlackBerry Administration Service, you specify the credentials that you use to log in to the BlackBerry Administration Service for the first time. 1. In the browser, type "https://<server_name>/webconsole/login", where <server_name> is the name of the computer that hosts the BlackBerry Administration Service. 2. In the "User name" field, type your username. 3. In the "Password" field, type your password. 4. Perform one of the following actions: * In the "Log in using" drop-down list, click "BlackBerry Administration Service". * In the "Log in using" drop-down list, click "Active Directory" and type the Microsoft Active Directory domain in the "Domain" field. 5. Click "Log in". 6. Install the RIMWebComponents.cab add-on if you are prompted to do so. For further details regarding the BlackBerry Device Service Installation and configuration, see the accompanying Overview Document, and the "Install the BlackBerry Device Service software" section of the BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 6.2, Installation and Configuration Guide.
Fix: F-43995r1_fix
Configure the BlackBerry Device Service server to authenticate through the Enterprise Authentication Mechanism utilizing a cryptographic module meeting the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-000877
- Version
- BBDS-00-000320
- Vuln IDs
-
- V-39039
- Rule IDs
-
- SV-50844r2_rule
Checks: C-46482r3_chk
Review the BlackBerry Device Service server configuration to ensure the system is authenticating through the Enterprise Authentication Mechanism that employs strong identification and authentication techniques in the establishment of non-local maintenance and diagnostic sessions. To ensure correct configuration, have the BlackBerry Device Service (BDS) Administrator log on to the BDS Server and ensure authentication was performed via Active Directory. If access to the server is not being authenticated via this method, this is a finding. To configure the BDS server to authenticate via Active Directory, the following process can be used: Local authentication rules are handled by the host operating system. Remote connection via web browser can be configured to use Microsoft Active Directory authentication during the installation of the BlackBerry Device Server. Configure permissions for the service account: The service account is a Windows account that runs the services for the BlackBerry Device Service. On the computer that you want to install the BlackBerry Device Service on, you must configure permissions for the service account. Without the correct permissions, the BlackBerry Device Service cannot run. If your organization's environment includes the BlackBerry Enterprise Server, you can use the BlackBerry Enterprise Server service account to install the BlackBerry Device Service. If you do not have a BlackBerry Enterprise Server service account, in Microsoft Active Directory, create a service account that you name BDSAdmin. During the installation of the BlackBerry Device Service, steps 16 and 17 describe the setup of the Active Directory login, as follows: 16. In the Microsoft Active Directory settings dialog box, specify information for the reader account that the BlackBerry Administration Service uses to authenticate with Microsoft Active Directory. By default, the setup application uses the service account that you used in step 1. If you want to use a different account as the reader account, you must specify the username, password, and Windows domain for a Microsoft Active Directory account. The account must have permission to read the user information that is stored in the global catalog servers that the BlackBerry Administration Service can access. 17. In the Create an administrator account dialog box, perform one of the following actions: * If you select Use Microsoft Active Directory authentication, you can choose to use the Microsoft Active Directory account that you used in step 16, or you can specify the username and Windows domain for a different Microsoft Active Directory account. * If you select Use BlackBerry Administration Service authentication, type and confirm a password for the BlackBerry Administration Service administrator account. You use the account information that you specify to log in to the BlackBerry Administration Service for the first time. Log in to the BlackBerry Administration Service: When you install the BlackBerry Administration Service, you specify the credentials that you use to log in to the BlackBerry Administration Service for the first time. 1. In the browser, type "https://<server_name>/webconsole/login", where <server_name> is the name of the computer that hosts the BlackBerry Administration Service. 2. In the "User name" field, type your username. 3. In the "Password" field, type your password. 4. Perform one of the following actions: * In the "Log in using" drop-down list, click "BlackBerry Administration Service". * In the "Log in using" drop-down list, click "Active Directory" and type the Microsoft Active Directory domain in the "Domain" field. 5. Click "Log in". 6. Install the RIMWebComponents.cab add-on if you are prompted to do so. For further details regarding the BlackBerry Device Service Installation and configuration, see the accompanying Overview Document, and the "Install the BlackBerry Device Service software" section of the BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 6.2, Installation and Configuration Guide.
Fix: F-43996r1_fix
Configure the BlackBerry Device Service server to authenticate through an Enterprise Authentication Mechanism that employs strong identification and authentication techniques in the establishment of non-local maintenance and diagnostic sessions.
- RMF Control
- SC-17
- Severity
- L
- CCI
- CCI-001159
- Version
- BBDS-00-000325
- Vuln IDs
-
- V-39040
- Rule IDs
-
- SV-50845r2_rule
Checks: C-46483r4_chk
Examine the server configuration to determine whether a DoD PKI issued certificate has been installed. Open Internet Explorer, and navigate to BlackBerry Administration Service. Click on the Lock icon located to the right of the Address bar (or click "Certificate error", if the certificate is untrusted) and select "View certificates". Ensure the certificate is issued by a valid DoD CA. Otherwise, this is a finding. Steps to replace self-signed or non-DoD certificate: Log into the server as the BlackBerry Enterprise Server (BES) service account and complete the following tasks to replace the self-signed Secure Socket Layer (SSL) certificate used by the BAS and the BWDM with a custom certificate (such as one from VeriSign or from a Windows certificate authority). Task 1 - Retrieve your keystore password: 1. Log in to the BAS as an administrator with the Security Administrator role. 2. Under "BlackBerry Solution topology" on the left side, navigate to "BlackBerry Domain > Component view > BlackBerry Administration Service". 3. In the "Security settings", check the value for "Default password to encrypt the web.keystore file" and note it. Task 2 - Back up the web.keystore file: 1. Open a Windows Command prompt as an Administrator 2. Type: copy "c:\Program Files (x86)\Research In Motion\BlackBerry Device Service\BAS\bin\web.keystore" "c:\Program Files (x86)\Research In Motion\BlackBerry Device Service\bas\bin\web.keystore.OLD" Note: Do not remove or rename the existing web.keystore file. Task 3 - Delete the self-signed SSL certificate from inside the keystore file: 1. Open a Command prompt as an Administrator. 2. Type "c:\Program Files\Java\jre1.6.0_31\bin\keytool.exe" -delete -alias httpssl -keystore "C:\Program Files (x86)\Research In Motion\BlackBerry Device Service\bas\bin\web.keystore" -storepass "<password>" Note: The -storepass parameter must be the password you retrieved from step 1. The quotes are required due to special characters. Task 4 - Generate the BlackBerry Administration Service certificate key pair: * Type "c:\Program Files\Java\jre1.6.0_31\bin\keytool.exe" -genkey -alias httpssl -keystore "C:\Program Files (x86)\Research In Motion\BlackBerry Device Service\bas\bin\web.keystore" -storepass "<password>" -dname "CN=<BAS Server or BAS Pool full name>, OU=BAS, O=Company, L=City, ST=ST, C=US" Note: Some Certificate Authority (CA) servers require RSA encryption of the certificate request. If this is the case, add -keyalg RSA to this keytool command. Also, the -keyalg RSA switch defaults to 1024 as a keysize. For environments that require 2048 as a keysize, use the -keysize 2048 command switch, e.g., -keyalg RSA -keysize 2048 STOP: After following this step, the web.keystore file now contains a private key entry. This exact private key MUST be matched with the reply generated from your Certificate Authority below in order for this process to succeed. It is highly recommended that the web.keystore file be backed up after this step has been performed, so that this private key is retained. If this is not done, and any of the following steps are not successful, then it will be necessary to clear out the keystore and start again from Task 1. This is especially important to note for environments with manual certificate request processes. Task 5 - Generate a certificate request to the certification authority: * Type "c:\Program Files\Java\jre1.6.0_31\bin\keytool" -certreq -alias httpssl -keystore "C:\Program Files (x86)\Research in Motion\BlackBerry Device Service\BAS\bin\web.keystore" -file "C:\certreq.csr" -storepass "<password>" Note: If the -keyalg switch was used in Task 3 for a CA that requires RSA encryption, it is recommended to also use it here. Also, the -keyalg RSA switch defaults to 1024 as a keysize. For environments that require 2048 as a keysize, use the -keysize 2048 command switch. e.g. -keyalg RSA -keysize 2048 * "c:\Program Files\Java\jre1.6.0_31\bin\keytool" -certreq -alias httpssl -keystore "C:\Program Files (x86)\Research in Motion\BlackBerry Device Service\BAS\bin\web.keystore" -file "C:\certreq.csr" -storepass "<passwprd>" -keyalg RSA -keysize 2048 Task 6 - Request the certificate from the certificate authority (CA): Note: The steps in this task are based on the steps required to request a certificate from a Windows certificate authority. If requesting a certificate from a third-party certificate authority, see the information in the Additional Information section. Domain administrator permission is required to complete this task. 1. Log off the server as the BlackBerry Enterprise Server service account. 2. Log into the server with a domain account with domain administrator permissions or permissions to submit a webserver template request. 3. Browse to the organization's certificate server using Windows Internet Explorer. (For example: http://<certificate_server_name>/certsrv) 4. Click "Request a certificate". 5. Click "Advanced certificate request". 6. Click "Submit a certificate request by using a base-64-encoded CMC or PKCS #10 file", or "submit a renewal request by using a base-64-encoded PKCS#7 file". 7. Paste the full contents of the certreq.csr file into the "Saved Request" field. 8. Choose "Web Server" from the "Certificate Template" drop-down list. 9. Click "Submit". 10. Click "Download certificate". 11. Save the file to c:\bascert.cer when prompted. Note: If the error "The certificate is not valid for the requested usage" appears, choose Subordinates Certification Authority from the Certificate Template drop-down list instead of Web Server. Task 7 - Download the CA certificate from the certificate authority: 1. Browse to the organization's certificate server using Windows Internet Explorer. (For example: http://<certificate_server_name>/certsrv) 2. Click "Download a CA certificate, certificate chain, or CRL". 3. Click "Download CA certificate". Save it as c:\certnewCA.cer. Task 8 - Import the CA certificate into the BlackBerry Administration Service key store: 1. Log off the server as the domain account used in Tasks 6 and 7 above to request the certificate from the certificate authority (CA). 2. Log onto the server as BES service account. 3. Open a command prompt window as Administrator in the same manner as used in Task 2. 4. Type: "c:\Program Files\Java\jre1.6.0_31\bin\keytool" -import -alias cacert -keystore "C:\Program Files (x86)\Research in Motion\BlackBerry Device Service\BAS\bin\web.keystore" -file "C:\certnewCA.cer" -storepass "<password>" If the BlackBerry Administration Service certificate is issued by an Intermediate CA, perform step 4 to import certificates of every Intermediate CA in the certificate chain. Use a unique alias name for every imported certificate. If the error "keytool error: java.lang.Exception: Failed to establish chain from reply" is displayed when performing Task 9 below, this step needs to be completed. To import an Intermediate Certificate Authority certificate: "c:\Program Files\Java\jre1.6.0_31\bin\keytool" -import -alias cacert2 -keystore "C:\Program Files (x86)\Research in Motion\BlackBerry Device Service\BAS\bin\web.keystore" -file "C:\certnewCA2.cer" -storepass "<password>" Task 9 - Import the BlackBerry Administration Service certificate to the BlackBerry Administration Service key store: * In the command prompt window used in Task 8, type: "c:\Program Files\Java\jre1.6.0_31\bin\keytool" -import -alias httpssl -keystore "C:\Program Files (x86)\Research in Motion\BlackBerry Device Service\BAS\bin\web.keystore" -file "C:\bascert.cer" -storepass "<password>" Task 10 - Restart the BlackBerry Administration Service.
Fix: F-43997r1_fix
Use a DoD issued digital certificate on the BES to support BAS and BlackBerry Web Desktop Manager authentication.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000146
- Vuln IDs
-
- V-40718
- Rule IDs
-
- SV-52732r1_rule
Checks: C-47060r1_chk
Review the BlackBerry Device Service server policy configuration to determine whether the Advanced Audio Distribution Profile (A2DP) Bluetooth profile has been disabled. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify "Bluetooth A2DP" is set to "Disallow". Otherwise, this is a finding. Note: Check text is applicable for devices with EMM-Regulated (Work Space only).
Fix: F-45657r1_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable the Advanced Audio Distribution Profile (A2DP) Bluetooth profile.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000147
- Vuln IDs
-
- V-40719
- Rule IDs
-
- SV-52733r1_rule
Checks: C-47061r1_chk
Review the BlackBerry Device Service server policy configuration to determine whether the Audio/Video Remote Control Profile (AVRCP) Bluetooth profile has been disabled. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify "Bluetooth AVRCP" is set to "Disallow". Otherwise, this is a finding. Note: Check text is applicable for devices with EMM-Regulated (Work Space only).
Fix: F-45658r1_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable the Audio/Video Remote Control Profile (AVRCP) Bluetooth profile.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000148
- Vuln IDs
-
- V-40720
- Rule IDs
-
- SV-52734r1_rule
Checks: C-47062r1_chk
Review the BlackBerry Device Service server policy configuration to determine whether the Phone Book Access Profile (PBAP) Bluetooth profile has been disabled. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify both "Transfer Work Contacts Using Bluetooth PBAP or HFP" and "Bluetooth Contacts Transfer Using PBAP" are set to "Disallow". Otherwise, this is a finding.
Fix: F-45659r1_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable the Phone Book Access Profile (PBAP) Bluetooth profile.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000149
- Vuln IDs
-
- V-40721
- Rule IDs
-
- SV-52735r1_rule
Checks: C-47063r1_chk
Review the BlackBerry Device Service server policy configuration to determine whether the Hands-Free Profile (HFP) Bluetooth profile has been disabled. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify both "Transfer Work Contacts Using Bluetooth PBAP or HFP" and "Bluetooth HFP" are set to "Disallow". Otherwise, this is a finding.
Fix: F-45660r1_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable the Hands-Free Profile (HFP) Bluetooth profile.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000151
- Vuln IDs
-
- V-40722
- Rule IDs
-
- SV-52736r1_rule
Checks: C-47064r1_chk
Review the BlackBerry Device Service server policy configuration to determine whether the Message Access Profile (MAP) Bluetooth profile has been disabled. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify all of "Transfer Work Messages Using Bluetooth MAP", "Transfer Work Messages Using Bluetooth MAP Without Prompt", and "Bluetooth MAP" are set to "Disallow". Otherwise, this is a finding.
Fix: F-45661r1_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable the Message Access Profile (MAP) Bluetooth profile.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000152
- Vuln IDs
-
- V-40723
- Rule IDs
-
- SV-52737r1_rule
Checks: C-47065r1_chk
Review the BlackBerry Device Service server policy configuration to determine whether the Personal Area Networking (PAN) Bluetooth profile has been disabled. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify "Bluetooth PAN" is set to "Disallow". Otherwise, this is a finding. Note: Check text is applicable for devices with EMM-Regulated (Work Space only).
Fix: F-45662r1_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable the Personal Area Networking Profile (PAN) Bluetooth profile.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-003160
- Vuln IDs
-
- V-40724
- Rule IDs
-
- SV-52738r1_rule
Checks: C-47066r1_chk
Review the BlackBerry Device Service server configuration to determine whether the commercial application store contains any applications. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Software > Applications > Manage Applications" and verify that there are no applications listed under "BlackBerry World Applications". If there are applications listed under "Blackberry World Applications", this is a finding.
Fix: F-45663r1_fix
Configure the BlackBerry Device Service server application store to contain no commercial applications.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-003170
- Vuln IDs
-
- V-40725
- Rule IDs
-
- SV-52739r1_rule
Checks: C-47067r1_chk
Review the BlackBerry Device Service server configuration to determine whether the BlackBerry Enterprise Service 10 User Administration Tool has been utilized to set the screen-lock owner information. On the BlackBerry 10 device, lock the device and verify the lock screen reads: "I've read & consent to terms in IS user agreem't.". If it does not, this is a finding. In order to use the BlackBerry Enterprise Service 10 User Administration Tool to enable a lock screen warning banner, perform the following: 1. To open the command window for the BlackBerry Enterprise Service 10 User Administration Tool, on the computer that hosts the tool, on the taskbar, click Start > All Programs > BlackBerry Resource Kit for BlackBerry Enterprise Service 10 > BlackBerry Enterprise Service 10 User Administration Tool. 2. Type besuseradminclient <credentials> -set_owner_info -u <user_name>. 3. Perform any of the following actions: • To specify the owner name to display, type -name "<name>". • To specify a single line of text, type -info "I've read & consent to terms in IS user agreem't.". • To specify multiple lines of text using an input file, type -infofile <filename>.
Fix: F-45664r1_fix
Configure the Blackberry Device Service server to force the display of a warning banner on the mobile device.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000156
- Vuln IDs
-
- V-40726
- Rule IDs
-
- SV-52740r1_rule
Checks: C-47068r1_chk
Review the BlackBerry Device Service server policy configuration to determine whether the transfer of work files using Bluetooth OPP has been disabled. If there are multiple policies, they must all be reviewed. For EMM-Corporate (BlackBerry Balance) devices, log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify "Transfer Work Files Using Bluetooth OPP" is set to "Disallow." Otherwise, this is a finding. For EMM-Regulated (Work Space only) devices, log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify "Bluetooth File Transfer Using OBEX" is set to "Disallow." Otherwise, this is a finding.
Fix: F-45665r1_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable the transfer of work files using Bluetooth OPP.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000157
- Vuln IDs
-
- V-40727
- Rule IDs
-
- SV-52741r1_rule
Checks: C-47069r1_chk
Review the BlackBerry Device Service server policy configuration to determine whether the Message Access Profile (MAP) Bluetooth profile has been disabled. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify "Transfer Work Messages Using Bluetooth MAP" is set to "Disallow". Otherwise, this is a finding.
Fix: F-45666r1_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable the transfer of work messages using Bluetooth MAP.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000158
- Vuln IDs
-
- V-40728
- Rule IDs
-
- SV-52742r1_rule
Checks: C-47070r1_chk
Review the BlackBerry Device Service server policy configuration to determine whether the Message Access Profile (MAP) Bluetooth profile has been disabled. If there are multiple policies, they must all be reviewed. Log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify "Transfer Work Messages Using Bluetooth MAP Without Prompt" is set to "Disallow". Otherwise, this is a finding.
Fix: F-45667r1_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable the transfer of work messages using Bluetooth MAP without a user prompt.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000370
- Version
- BBDS-00-000159
- Vuln IDs
-
- V-40729
- Rule IDs
-
- SV-52743r1_rule
Checks: C-47071r1_chk
Review the BlackBerry Device Service server policy configuration to determine whether the transfer of any file-based data via Bluetooth has been disabled. If there are multiple policies, they must all be reviewed. The "Transfer Work Contacts Using Bluetooth PBAP or HFP" rule on the BlackBerry Device Service server specifies whether a BlackBerry device can send work contacts to another Bluetooth-enabled device using the Bluetooth PBAP or HFP. If this rule is set to disallow, users cannot transfer work contacts using Bluetooth PBAP or HFP. Setting this rule to disallow also prevents users from transferring work messages using the Bluetooth MAP. For EMM-Corporate (BlackBerry Balance) devices, log into BlackBerry Administration Service, and under "BlackBerry solution management" on the left side of the screen, navigate to "Policy > Manage IT policies > <Policy Name> > View complete IT Policy > Hardware" and verify "Transfer Work Contacts Using Bluetooth PBAP or HFP" is set to "Disallow." Otherwise, this is a finding.
Fix: F-45668r1_fix
Configure the centrally managed BlackBerry Device Service server policy rule to disable the transfer of Work Space contacts via Bluetooth.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- BBDS-00-000500
- Vuln IDs
-
- V-54981
- Rule IDs
-
- SV-69227r1_rule
Checks: C-55609r1_chk
BlackBerry support for BlackBerry Device service 6.2 and BlackBerry Enterprise Service 10.1.x BlackBerry Device Service ended 10 Feb 2014. If BlackBerry Device service 6.2 or BlackBerry Enterprise Service 10.1.x BlackBerry Device Service are installed on a system, this is a finding.
Fix: F-59845r1_fix
Upgrade BlackBerry Device service 6.2 or BlackBerry Enterprise Service 10.1.x BlackBerry Device Service systems to a supported MDM server.