BlackBerry OS 10.3.x Security Technical Implementation Guide

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected]

Details

Version / Release: V1R3

Published: 2016-09-08

Updated At: 2018-09-23 19:12:30

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-80173r1_rule BB10-3X-000100 CCI-002476 HIGH BlackBerry OS 10.3 must require a valid password be successfully entered before the mobile device data is unencrypted. Passwords provide a form of access control that prevents unauthorized individuals from accessing computing resources and sensitive data. Passwords may also be a source of entropy for generation of key encryption or data encryption keys. If a password is n
    SV-80175r1_rule BB10-3X-000110 CCI-000205 LOW BlackBerry OS 10.3 must enforce a minimum password length of 6 characters. Password strength is a measure of the effectiveness of a password in resisting guessing and brute force attacks. The ability to crack a password is a function of how many attempts an adversary is permitted, how quickly an adversary can do each attempt, an
    SV-80177r1_rule BB10-3X-000120 CCI-000057 MEDIUM BlackBerry OS 10.3 must lock the Work Space after 15 minutes (or less) of inactivity. The screen lock timeout must be set to a value that helps protect the device from unauthorized access. Having a too-long timeout would increase the window of opportunity for adversaries who gain physical access to the mobile device through loss, theft, et
    SV-80179r1_rule BB10-3X-000140 CCI-000044 LOW BlackBerry OS 10.3 must not allow more than 10 consecutive failed authentication attempts. The more attempts an adversary has to guess a password, the more likely the adversary will enter the correct password and gain access to resources on the device. Setting a limit on the number of attempts mitigates this risk. Setting the limit at 10 gives
    SV-80181r1_rule BB10-3X-000180 CCI-000063 MEDIUM BlackBerry OS 10.3 must not allow protocols supporting wireless remote access connections. Having wireless remote access connections enabled could allow establishment of unauthorized remote access connections, which may give an adversary unintended capabilities. These remote access connections would expose the mobile device to additional risk,
    SV-80183r1_rule BB10-3X-000190 CCI-000381 MEDIUM BlackBerry OS 10.3 must not allow use of developer modes. Developer modes expose features of the BlackBerry device that are not available during standard operation. When the Development Mode is enabled on BlackBerry 10 OS devices, the user has the capability to sideload apps to either the Work Space or Personal
    SV-80185r1_rule BB10-3X-000210 CCI-001199 HIGH BlackBerry OS 10.3 must protect data at rest on removable storage media. The requirement applies only to Work - Only Activation types. The BlackBerry device must ensure the data being written to the mobile device's removable media is protected from unauthorized access. If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions on dat
    SV-80187r1_rule BB10-3X-000240 CCI-000048 LOW BlackBerry OS 10.3 must display the DoD advisory warning message each time the device restarts. This requirement does not apply to Work and personal - Corporate. The BlackBerry OS 10.3 is required to display the DoD-approved system use notification message or banner before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives,
    SV-80189r1_rule BB10-3X-000250 CCI-000381 MEDIUM BlackBerry OS 10.3 must not allow the USB mass storage mode. USB mass storage mode enables the transfer of data and software from one device to another. This software can include malware. When USB mass storage is enabled on a mobile device, it becomes a potential vector for malware and unauthorized data exfiltratio
    SV-80191r1_rule BB10-3X-000290 CCI-000381 LOW BlackBerry OS 10.3 must disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled. Many software systems automatically send diagnostic data to the manufacturer or a third party. This data enables the developers to understand real world field behavior and improve the product based on that information. Unfortunately, it can also reveal in
    SV-80193r1_rule BB10-3X-000330 CCI-000366 MEDIUM BlackBerry OS 10.3 work space whitelist must not include applications with the following characteristics: (See Vulnerability Discussion for list). Requiring all authorized applications to be in an application whitelist prevents the execution of any applications (e.g., unauthorized, malicious) that are not part of the whitelist. Failure to configure an application whitelist properly could allow unaut
    SV-80195r1_rule BB10-3X-000340 CCI-000366 MEDIUM BlackBerry OS 10.3 must be configured to disable all Bluetooth profiles except for HSP (Headset Profile), HFP (HandsFree Profile), and SPP (Serial Port Profile). Some Bluetooth profiles provide the capability for remote transfer of sensitive DoD data without encryption or otherwise do not meet DoD IT security policies and therefore should be disabled. SFR ID: FMT_SMF_EXT.1.1 #20
    SV-80197r1_rule BB10-3X-000380 CCI-000366 MEDIUM BlackBerry OS 10.3 must be configured to prevent non-approved updates of system software. FOTA allows the user to download and install firmware updates over-the-air. These updates can include OS upgrades, security patches, bug fixes, new features and applications. Since the updates are controlled by the carriers, DoD will not have an opportuni
    SV-80199r1_rule BB10-3X-000930 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: limit Work Space contact data available in Personal space. The contact database often contains a significant amount of information beyond each person's name and phone number. The records may contain addresses and other identifying or sensitive information that should not be revealed. There may be cases in which a
    SV-80201r1_rule BB10-3X-000950 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: must bind removable storage media cards to the mobile device via centrally managed policy. This requirement is applicable to Work space only activation Type. The removable media card is an extension of the embedded device media. In order to protect sensitive data stored on the media card, the data must be encrypted and bound to the device such that it cannot be read by other mobile devices and computers. SFR
    SV-80203r1_rule BB10-3X-000970 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: disable Bluetooth Discoverable Mode via centrally managed policy. This requirement only applies to Work space only and Work and personal - Regulated activation types. Bluetooth usage could provide an attack vector for a hacker to connect to a BlackBerry device without the knowledge of the user. Disabling Discoverable mode reduces the risk of a non-authorized Bluetooth device connecting the DoD BlackBerry. SFR ID: FMT_
    SV-80205r1_rule BB10-3X-000980 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: disable the transfer of any file-based data via Bluetooth. Bluetooth data transfers, except when using an approved smart card reader, do not use FIPS validated encryption. Therefore data transfer via Bluetooth must be disabled to mitigate the possible loss of sensitive DoD information. SFR ID: FMT_SMF_EXT.1.1 #4
    SV-80207r1_rule BB10-3X-000990 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: disable the transfer of any file-based data via Near Field Communication (NFC) via centrally managed policy. NFC data transfers do not use FIPS validated encryption. Therefore data transfer via NFC must be disabled to mitigate the possible loss of sensitive DoD information. SFR ID: FMT_SMF_EXT.1.1 #45
    SV-80209r1_rule BB10-3X-001000 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: enforce the minimum password length for the Personal Space password to 4 digits. This requirement does not apply to the Work space only activation type. Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. The ability to crack a password is a function of how many attempts an adversary is permitted, how quickly an adversary can do each attempt, an
    SV-80211r1_rule BB10-3X-001010 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: disallow Personal Space applications access to the Work Space network connection. This requirement does not apply to the Work space only activation type. Allowing movement of files and data from the personal Space to the Work Space will result in both personal data and sensitive DoD data being placed in the same space. This can potentially result in DoD data being transmitted to non-authorized recipients v
    SV-80213r1_rule BB10-3X-001040 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: disable BlackBerry Bridge. BlackBerry Bridge is used to view information on the BlackBerry via the BlackBerry Playbook tablet. Use of the BlackBerry Playbook is not allowed in the DoD, therefore BlackBerry Bridge must be disabled. SFR ID: FMT_SMF_EXT.1.1 #45
    SV-80215r1_rule BB10-3X-001050 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: disable lock screen preview of work content. Sensitive data could be viewed if the preview of data on the locked screen is not disabled and could be exposed to unauthorized viewers. SFR ID: FMT_SMF_EXT.1.1 #45
    SV-80217r1_rule BB10-3X-020200 CCI-000366 LOW The BlackBerry MDM Agent must be configured to operate in a NIAP Common Criteria mode of operation, to enable generation of audit records of required events: (See Vulnerability Discussion for list). This requirement only applies to Work space only and Work and personal - Regulated activation types. Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. They help identify attacks, so that breaches can either be prevented or limited in their scope. They facilitate analysis to improve performance and secu
    SV-80239r1_rule BB10-3X-020265 CCI-000366 MEDIUM BlackBerry OS 10.3 must force the use of BBM Protected mode. BBM Protected mode provides strong data encryption for the Blackberry chat service. If data-in-transit is unencrypted, it is vulnerable to disclosure. SFR ID: FMT_SMF_EXT.1.1 #45
    SV-80243r1_rule BB10-3X-020275 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: disable Voice Dictation in Work Applications. Voice Dictation in Work Applications uses a cloud based services to provide dictation support. Sensitive DoD data could be at risk of exposures if this service is enabled. SFR ID: FMT_SMF_EXT.1.1 #45
    SV-80245r1_rule BB10-3X-020280 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: display External Email Address Warning Message. The "External Email Address Warning Message" allows administrators to enforce a feature on the BlackBerry 10 smartphones to display a warning message for email addresses that are deemed as external to the primary internal mail domain. This feature provide
    SV-80247r1_rule BB10-3X-020290 CCI-000366 MEDIUM BlackBerry OS 10.3 must implement the management setting: Check certificate expiry for MDM connection. Without strong authentication of the MDM, the MDM agent may connect to a rogue MDM and the mobile device could then come under management control of the rogue MDM. This could lead to exposure of sensitive DoD data. SFR ID: FMT_SMF_EXT.1.1 #45
    SV-80249r1_rule BB10-3X-020300 CCI-000366 HIGH BlackBerry OS 10.3 must protect data at rest on built-in storage media for Personal space. This requirement only applies to Work and Personal Corporate and Work and personal - Regulated activation types. The BlackBerry device must ensure the data being written to the mobile device's built-in storage media is protected from unauthorized access. If data at rest is unencrypted, it is vulnerable to disclosure. Even if the operating system enforces permissions
    SV-80251r1_rule BB10-3X-020320 CCI-000366 MEDIUM BlackBerry OS 10.3 must prevent opening links in work email messages in the personal browser. This requirement only applies to Work and personal - Corporate and Work and personal - Regulated activation types. If web links in work email were opened using the personal browser, there is a possibility that sensitive DoD data could spill from the Work space to the Personal space, which could lead to public exposure of that data. SFR ID: FMT_SMF_EXT.1.1 #45
    SV-80253r1_rule BB10-3X-020330 CCI-000366 MEDIUM BlackBerry OS 10.3 must prevent untrusted connections to the mail server. If an untrusted connection to a mail server is allowed, the device may connect to either a rogue email server or a compromised DoD email server. In either case, sensitive DoD data could be compromised. SFR ID: FMT_SMF_EXT.1.1 #45
    SV-80255r1_rule BB10-3X-020340 CCI-000366 MEDIUM BlackBerry OS 10.3 must prevent the use of BlackBerry Protect. BlackBerry Protect gives users the ability to remotely lock, wipe, send audible alerts, and locate their BlackBerry device, but can become a maintainability issue for enterprise deployments. If a user forgets their BlackBerry ID password, the device must
    SV-80263r1_rule BB10-3X-020350 CCI-000366 MEDIUM BlackBerry OS 10.3 must prevent third-party apps from using BlackBerry Blend. If third party apps are allowed to use BlackBerry Blend, it may be possible for DoD data on the BlackBerry that is being displayed on a PC via the Blend connection to be saved to the PC. Sensitive DoD data could be at risk of compromise in this case. SFR
    SV-86115r1_rule BB10-3X-001060 LOW The BlackBerry OS 10.3 The BlackBerry OS 10.3 smartphone must close the Hotspot Browser connection if the user does not log into the Hotspot Browser after 15 minutes (or less). This configuration setting sets the amount of time the hotspot browser remains open without login. The hotspot browser could be at risk of attack by an adversary if it remains open when not being used by the handset user. It is a best practice to close
    SV-86117r1_rule BB10-3X-001070 LOW The BlackBerry OS 10.3 smartphone must implement the management setting: Allow use of preloaded trusted root certificates This configuration setting specifies whether a BlackBerry device can use preloaded trusted root certificates to establish a trusted certificate chain. If this rule is not selected, the device can use only trusted root certificates that are sent from BES12