BlackBerry Playbook OS (NEA mode) Security Technical Implementation Guide (STIG)

This document describes required technical IA controls for the Playbook when used in the Non-Enterprise Activated (NEA mode). NEA mode is when the device is not connected to the DoD network and does not process sensitive DoD data or email.

Details

Version / Release: V1R7

Published: 2014-08-25

Updated At: 2018-09-23 02:04:32

Actions

Download

Filter


Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-40110r2_rule WIR-MOS-NS-006-01 LOW All non-core applications on mobile devices must be approved by the DAA or Command IT Configuration Control Board. Non-approved applications can contain malware. Approved applications should be reviewed and tested by the approving authority to ensure they do not contain malware, spyware, or have unexpected features (e.g., send private information to a web site, track
    SV-40111r2_rule WIR-MOS-NS-010 LOW Smartphones must be configured to require a password/passcode for device unlock. Sensitive DoD data could be compromised if a device unlock password/passcode is not set up on DoD smartphones.System AdministratorECWN-1, IAIA-1
    SV-40112r2_rule WIR-MOS-NS-016 LOW The smartphone inactivity timeout must be set. Sensitive DoD data could be compromised if the smartphone does not automatically lock after the required period of inactivity.System AdministratorPESL-1
    SV-40113r2_rule WIR-MOS-NS-011 LOW The device minimum password/passcode length must be set. Sensitive DoD data could be compromised if a device unlock password/passcode is not set to required length on DoD smartphones. System AdministratorECWN-1, IAIA-1
    SV-40117r2_rule WIR-MOS-NS-050-01 LOW The installation of user owned applications on the mobile device must be based on the Command’s Mobile Device Personal Use Policy. The risk of installing personally owned or freeware apps on a DoD mobile device should be evaluated by the DAA against mission need and how the device is intended to be used. There is a risk that personally owned or freeware apps could introduce malware
    SV-40123r2_rule WIR-MOS-NS-050-02 LOW The use of the mobile device to view and/or download personal email must be based on the Command’s Mobile Device Personal Use Policy. The risk of viewing and downloading personal email on a non-DoD-network connected mobile device that does not contain sensitive or classified DoD data/information should be evaluated by the DAA against mission need and how the device is intended to be use
    SV-40125r2_rule WIR-MOS-NS-050-03 LOW Download of user owned data (music files, picture files, etc.) on mobile devices must be based on the Command’s Mobile Device Personal Use Policy. The risk of installing user owned data (music files, picture files, etc.) on a non-DoD-network connected mobile device that does not contain sensitive or classified DoD data/information should be evaluated by the DAA against mission need and how the devic
    SV-40127r2_rule WIR-MOS-NS-050-04 LOW Connecting mobile devices to user social media web accounts (Facebook, Twitter, etc.) must be based on the Command’s Mobile Device Personal Use Policy. The risk of connecting to user social media web accounts on a non-DoD-network connected mobile device that does not contain sensitive or classified DoD data/information should be evaluated by the DAA against mission need and how the device is intended to
    SV-68129r1_rule PB21-00-000000 CCI-000366 HIGH BlackBerry PlayBook OS versions no longer supported by the manufacturer or vendor must not be installed on a device. Unsupported versions of the operating system do not contain new security-related features and security patches that address known vulnerabilities. Software or hardware no longer supported by the manufacturer or vendor are not maintained or updated for cur