Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
On the mobile device management server, determine the version number of the server. The exact procedure will vary, depending on the mobile device management product used. -Verify the server version is the latest available version and includes the latest patches available. Talk to the site system administrator and view the vendor's web site to determine the correct version number. -Mark as a finding if the server version is not as required.
Upgrade to required (or later) mobile device management server version.
Work with the OS Reviewer or check VMS for last review of each host server where a mobile management server is installed. This includes the host server for the MDM, MAM, MDIS, and MEM servers. The review should include the SQL server, Apache Tomcat, and IIS, if installed. Mark as a finding if the previous or current OS review of the Windows server did not include the SQL or other applications included with the management server.
Conduct required STIG reviews of the OS and all installed applications on the host server.
The host server host-based or appliance firewall must be configured as required. The server firewall is configured with the following rules: -Deny all except when explicitly authorized. -Internal traffic from the server is limited to internal systems used to host the smartphone services (e.g., email and LDAP servers) and approved back-office application and content servers. Communications with other services, clients, and/or servers are not authorized. -Internet traffic from the server is limited to only specified services (e.g., Good NOC server, OCSP, SSL/TLS, HTTP, and LDAP). All outbound connections are initiated by the mobile management server and/or service. -Firewall settings listed in the STIG Technology Overview or the vendor's installation manual will be implemented, including blocking connections to web proxy servers and back-office application and content servers unless the server Internet Protocol (IP) address is on the firewall list of trusted IP addresses and subnets. Note: At a minimum, the IP address of the site Internet proxy server must be listed so the Good secure browser can connect to the Internet. Note: The HBSS firewall can be used to meet these requirements if one or more firewall rules have been set up on the firewall as described above. Check Procedures: -Verify the firewall configuration meets approved architecture configuration requirements (or have the Network Reviewer do the review of the firewall). -Verify the firewall is configured to block connections to internal servers unless the server IP address is included on the list of trusted networks. IP addresses of the enclave web proxy server and authorized back-office application and content servers the server connects to should be included on this list. - Mark as a finding if the IP addresses configured on the server host-based firewall are not on the list of trusted networks.
Install the management server host-based or appliance firewall and configure as required.
Verify a DoD server certificate has been installed on the mobile management server and that the self-signed certificate, available as an option during the setup of the wireless email management server, has not been installed. The check procedure will depend on the mobile management server product used. Mark as a finding if a DoD server certificate has not been installed on the mobile device management server. For the Good Technology server follow these procedures: -Ask the SA to access the Good server using Internet Explorer. Verify no certificate error occurs. -Click the Lock icon next to the address bar, then select “view certificates”. On the General tab, verify the “Issued to:” and “Issued by:” fields do not show the same value. Then on the Certification Path tab, verify the top certificate is a trusted DoD Root certificate authority (e.g., DoD Root CA 2) and the certificate status field states “This certificate is OK”. If a certificate error occurs, either the default self-signed certificate is still installed, the Good server has not been rebooted since the DoD-issued certificate has been installed, or the computer accessing the Good server does not have the DoD Root and Intermediate certificate authorities installed. The reviewer can select the “Continue to this website” option and follow the same procedure above. If the certificate is issued from an approved DoD PKI, ask the SA to run InstallRoot on the computer accessing the Good server. Otherwise, have the SA follow the procedures outlined in the STIG to request/install a certificate issued from a trusted DoD PKI.
Use a DoD-issued digital certificate on the mobile management server.
Review the admin accounts settings on the mobile management server to verify CTO 07-15 Rev 1 required authentication is enabled for admin accounts. The check procedure will depend on the mobile management server product used. Mark as a finding if site admin accounts do not meet the requirements.
Configure required authentication on system administration accounts for mobile management servers.
Verify the MEM client provides users with the option to deny acceptance of a certificate when the certificate's revocation status cannot be verified. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that provides users with the option to deny acceptance of a certificate when the certificate's revocation status cannot be verified.
Verify the MEM client alerts the user if it receives a public-key certificate issued from an untrusted certificate authority. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that alerts the user if it receives a public-key certificate issued from an untrusted certificate authority.
Verify the MEM client alerts the user if it receives an invalid public-key certificate. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that alerts the user if it receives an invalid public-key certificate.
Verify the MEM client does not accept certificate revocation information without verifying its authenticity. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that does not accept certificate revocation information without verifying its authenticity.
Verify the MEM client verifies the user digital certificate in the certificate chain when performing PKI transactions. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that verifies the user digital certificate in the certificate chain.
Verify the MEM client alerts the user if it receives an unverified public-key certificate. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use an MEM product that alerts the user if it receives an unverified public-key certificate.
Verify the MEM client supports sending all email (including email attachments) over the wireless link between the mobile email client and MEM server located on the DoD network using AES. Verify the AES encryption key length is at least 128-bit. (AES 128-bit encryption key length is the minimum requirement; AES 256 desired.) Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that supports sending all data (including email and attachments) over the wireless link between the mobile email client and MEM server located on the DoD network using AES with an encryption key length of at least 128-bit.
Verify the MEM client encrypts all data using a FIPS 140-2 validated cryptographic module. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Vendor must provide valid NIST FIPS Certificate for the cryptographic module utilized. Mark as a finding if the MEM server does not have required features.
Use a MEM product that encrypts all email using a FIPS 140-2 validated cryptographic module.
Verify the MEM client is capable of providing S/MIME v3 (or later version) encryption of email. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that is capable of providing S/MIME v3 (or later version) encryption of email.
Verify the MEM client S/MIME feature is fully interoperable with the DoD PKI. CAC/PIV (and alternative hard token form factors such as SE MicroSD) and PKCS#12 (soft token) certificates must be supported. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that has an S/MIME feature that is fully interoperable with DoD PKI.
Verify the MEM client S/MIME encryption algorithm supports both 3DES and AES. When AES is used, AES 128-bit encryption key length is the minimum requirement; AES 256 desired. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that supports S/MIME encryption with an algorithm that supports both 3DES and AES.
Verify the MEM client S/MIME cryptographic module must be FIPS 140-2 validated. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that has an S/MIME cryptographic module that is FIPS 140-2 validated.
Verify the MEM client saves public certificates of contacts in the contact object by one of the following methods: 1. By saving public PKI certificates that were attached to a received email message to the contacts object. 2. By downloading the certificates via an external partner PKI lookup from the mobile device. 3. By sending a signed email to a contact that just sent a signed email. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that saves public certificates of contacts in the contact object by one of the acceptable methods.
There is no requirement that the certificate status of an email recipients PKI certificate be cached on the mobile device. If it is cached, the status must be deleted within 7 days after being saved in the cache. Determine if the MEM client caches the certificate status of an email recipients PKI certificate. If yes, verify the certificate status is purged from cache within 7 days after being saved. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features. Mark as NA if the MEM client does not cache the certificate status.
Use a MEM product that supports certificate status caching of no more than 7 days, if certificate status caching is supported.
Verify the MEM client sets the Smart Card or Certificate Store Password caching timeout period from at least 15 to 120 minutes, if Smart Card or Certificate Store Password caching is available. Talk to the site system administrator and have them show this capability exists in the MEM server and is set as required. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features. Mark as NA if the MEM client does not cache the certificate store password.
Use a MEM product to set the Smart Card or Certificate Store Password caching timeout period of no more than 120 minutes, if Smart Card or Certificate Store Password caching is available.
Verify the MEM client that provides the mobile device user the capability to digitally sign and/or encrypt outgoing email messages using software or hardware based digital certificates. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that provides the mobile device user the capability to digitally sign and/or encrypt outgoing email messages using software or hardware based digital certificates.
Verify the MEM client provides the mobile device user the capability to decrypt incoming email messages using software or hardware based digital certificates. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that provides mobile device users the capability to decrypt incoming email messages using software or hardware based digital certificates.
Verify the MEM client provides a mechanism to provide certificate validation through a trusted OCSP, CRL, or SCVP. Trusted in this context means signed with a DoD PKI certificate. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that provides a mechanism to provide certificate validation through a trusted OCSP, CRL, or SCVP.
Verify the MEM client provides a noticeable warning to the user if the CRL, SCVP, or OCSP server cannot be contacted or the revocation data provided cannot be verified. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that provides a noticeable warning to the user if the CRL, SCVP, or OCSP server cannot be contacted or the revocation data provided cannot be verified.
Verify the MEM client that supports retrieving encryption certificates not stored in the local trust anchor store for S/MIME purposes. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that supports retrieving encryption certificates not stored in the local trust anchor store for S/MIME purposes.
Verify the MEM client that supports SHA2 or later signing operations. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that supports SHA2 or later signing operations.
Verify the MEM server either blocks or converts all active content in email (HTML, RTF, etc.) to text before the email is forwarded to the mobile device. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that either blocks or converts all active content in email (HTML, RTF, etc.) to text before the email is forwarded to the mobile device.
Verify the MEM client supports SHA2 signature verification. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that supports SHA2 signature verification.
Verify the MEM manages all email by a mobile email management server. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product manages all email by a mobile email management server.
Verify the MEM server supports the capability to limit the fields in the email client contacts list can be exported to the mobile device contacts list, if this capability is supported. This feature is usually implemented via a security policy pushed from the MEM server to the email client. Transferred email contact information should be limited to contact name and telephone numbers. Talk to the site system administrator and have them show this capability exists in the MEM server. Also, review MEM product documentation. Mark as a finding if the MEM server does not have required features.
Use a MEM product that supports the capability to limit what fields in the email client contacts list can be exported to the mobile device contacts list.
This requirement applies to any mobile management server, including the MDM, MAM, MDIS, and MEM. If PKI-based encryption key generation is used between the management server and the agent on the mobile device, this check is not applicable. Work with the server system administrator and determine how the encryption key is generated. If a shared secret is used between the management server and the agent on the mobile device, view the configuration of the master encryption key on the server. Verify AES is used for the master encryption key and it is set to rotate at least every 30 days. Mark as a finding if the master encryption key is not rotated at least every 30 days or AES encryption is not used.
Use an AES master encryption key and set it to rotate at least every 30 days.