Mobile Policy Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-001382
- Version
- SRG-MPOL-001
- Vuln IDs
-
- V-35910
- Rule IDs
-
- SV-47226r1_rule
Checks: C-44154r1_chk
Review the organization's access control policy and security procedures for mobile devices to determine if the organization has properly and clearly defined the maximum number of consecutive unsuccessful login attempts to the mobile device. If the security procedures or access control policy does not define the maximum number of consecutive unsuccessful login attempts, this is a finding.
Fix: F-40441r1_fix
Clearly define the maximum number of consecutive unsuccessful login attempts to the mobile device in its access control policy and/or security procedures.
- RMF Control
- AC-17
- Severity
- L
- CCI
- CCI-001435
- Version
- SRG-MPOL-002
- Vuln IDs
-
- V-35911
- Rule IDs
-
- SV-47227r2_rule
Checks: C-44155r1_chk
Review the organization's policies related to network protocols. The organization must document those networking protocols within the information system deemed to be non-secure for remote access into DoD networks. If the policies do not specifically list non-secure protocols, this is a finding.
Fix: F-40442r1_fix
Create and document a list of networking protocols within the information system deemed to be non-secure for remote access into DoD networks.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001455
- Version
- SRG-MPOL-003
- Vuln IDs
-
- V-35912
- Rule IDs
-
- SV-47228r1_rule
Checks: C-44156r1_chk
Review the organization's CMD policy to determine if it states that a risk-based determination for applications is performed before they are accredited by the DAA prior to distribution or installation on a CMD. If the organization's CMD policy does not provide for a risk-based determination and approval, prior to installation on a CMD, this is a finding.
Fix: F-40443r1_fix
Include a risk-based determination and DAA accreditation for applications prior to installation on a CMD in the CMD policy.
- RMF Control
- AC-17
- Severity
- L
- CCI
- CCI-001455
- Version
- SRG-MPOL-004
- Vuln IDs
-
- V-35913
- Rule IDs
-
- SV-47229r1_rule
Checks: C-44157r2_chk
Review the accreditation documentation to determine if the WMAN system is a tactical system or a commercial system used in a tactical environment. If the WMAN system is not a tactical system or a commercial system operated in a tactical environment, this requirement is NA. Verify a TRANSEC vulnerability analysis was performed on the WMAN system during the system C&A review. The documentation must include the required components. Verification that radio communications are encrypted, including the management, control and data frames, determination of denial of service risks to the network, and probability of LPE for the WMAN signal. If documentation is missing the required analysis and components, this is a finding. Note: Check with NSA to determine if additional mitigation actions are available.
Fix: F-40444r1_fix
Include a TRANSEC vulnerability analysis in the WMAN system accreditation if the WMAN system operates in a tactical environment.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001445
- Version
- SRG-MPOL-005
- Vuln IDs
-
- V-35919
- Rule IDs
-
- SV-47235r1_rule
Checks: C-44158r1_chk
Review the site's network monitoring and scanning procedures. Determine if monitoring of the WIDS is being conducted at an organized defined time period. If WIDS monitoring is not being performed at an organization defined time period, this is a finding.
Fix: F-40445r1_fix
Monitor for unauthorized wireless connections to the information system at an organization defined time period.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001447
- Version
- SRG-MPOL-006
- Vuln IDs
-
- V-35920
- Rule IDs
-
- SV-47236r1_rule
Checks: C-44159r1_chk
Review the organization's access control and security policy, procedures addressing wireless implementation and usage (including restrictions), wireless scanning reports, and any other relevant documentation. The objective is to verify the organization has: (i) established a requirement for monitoring the wireless connection environment for unauthorized access, (ii) established a requirement of periodic scans to be conducted for unauthorized wireless access points, and (iii) established a time period at which these activities are to be conducted. If the organization has not defined the time period for monitoring or scanning, this is a finding.
Fix: F-40446r1_fix
Define the time period for monitoring of unauthorized wireless connections to information systems to include the time period for performing scans to identify unauthorized wireless access points.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001448
- Version
- SRG-MPOL-007
- Vuln IDs
-
- V-35921
- Rule IDs
-
- SV-47237r1_rule
Checks: C-44160r1_chk
Review the organization's access control and security policy, along with any other relevant documentation, to verify the organization documents and takes the appropriate actions when unauthorized wireless connections are discovered. If the organization does not follow the defined procedures, this is a finding.
Fix: F-40447r1_fix
Update documented procedures to document and take appropriate action if an unauthorized wireless connection is discovered.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001563
- Version
- SRG-MPOL-008
- Vuln IDs
-
- V-35922
- Rule IDs
-
- SV-47238r1_rule
Checks: C-44161r1_chk
Review the organization's access control and security policy, along with any other relevant documentation, to verify the organization has defined actions to be taken when unauthorized wireless connections are discovered. If the organization has not defined the appropriate actions, this is a finding.
Fix: F-40448r1_fix
Define and document the appropriate action(s) to be taken when unauthorized wireless connections are discovered.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001438
- Version
- SRG-MPOL-010
- Vuln IDs
-
- V-35924
- Rule IDs
-
- SV-47240r1_rule
Checks: C-44163r1_chk
Review the organization's access control policy, security procedures addressing wireless usage restrictions, and other relevant documents. The objective is to ensure the organization has defined usage restrictions for all wireless access. If the organization has not established usage restrictions, this is a finding.
Fix: F-40450r1_fix
Establish a usage restrictions policy for wireless access within the organization's boundaries/enclave/area of responsibility.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001451
- Version
- SRG-MPOL-009
- Vuln IDs
-
- V-35928
- Rule IDs
-
- SV-47244r2_rule
Checks: C-44164r1_chk
Review the organization's access control and procedures addressing wireless implementation and usage (including restrictions), security policy, information system configuration settings, restrictions and any other associated documentation, and other relevant documents or records. Ensure the organization has defined and established organization-controlled boundaries for the implementation of Wi-Fi and Bluetooth communications. If wireless boundaries are not defined and controlled, this is a finding.
Fix: F-40451r1_fix
Define and establish organization controlled boundaries for the implementation of the Wi-Fi and Bluetooth communications.
- RMF Control
- AC-18
- Severity
- L
- CCI
- CCI-001438
- Version
- SRG-MPOL-011
- Vuln IDs
-
- V-35929
- Rule IDs
-
- SV-47245r1_rule
Checks: C-44166r2_chk
Review the CONOPS or site security plan on the use of Bluetooth devices and determine what class of radio is allowed for use. If Class 1 radios are allowed for use in Bluetooth devices, this is a finding.
Fix: F-40453r1_fix
Update policy to include Bluetooth devices must use only Class 2 or 3 standard radios.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001438
- Version
- SRG-MPOL-012
- Vuln IDs
-
- V-35930
- Rule IDs
-
- SV-47246r1_rule
Checks: C-44167r2_chk
Review the CONOPS or site security plan on the use of Bluetooth devices and determine if the radio is in conformance with the specifications. If wireless equipment or systems are activated inside the United States and Possessions, then this requirement is NA. If any modifications (signal amplification, antenna modification, etc.) have been made, this is a finding.
Fix: F-40454r2_fix
Update CONOPS or site security plan to include Bluetooth radios must not be modified through signal amplification, antenna configuration, or other techniques that could affect signal detection or interception.
- RMF Control
- AC-18
- Severity
- L
- CCI
- CCI-001438
- Version
- SRG-MPOL-014
- Vuln IDs
-
- V-35932
- Rule IDs
-
- SV-47248r1_rule
Checks: C-44169r2_chk
Verify the existence of approval documentation signed by USFORSCOM or host nation representatives. In accordance with DoD policy, users of non-licensed devices that are intended for use outside of the US&P must submit appropriate forms (DD 1494) for host nation coordination/approval. This is not necessary when it is well known that the host nation makes wide use of the same WLAN protocols as the DoD (i.e., Wi-Fi specifications 802.11b, 802.11g, or 802.11n). However, this should be verified. Most noteworthy is that WLAN equipment in Japan uses 802.11j which operates in the 4.9 to 5.0 GHz band. WLAN equipment based on other standards interferes with such equipment in Japan. If approval documentation does not exist or is not available for verification, this is a finding.
Fix: F-40456r1_fix
Receive approval documentation signed by USFORSCOM or host nation representatives prior to activating wireless equipment or systems outside the US&P.
- RMF Control
- AC-18
- Severity
- H
- CCI
- CCI-001438
- Version
- SRG-MPOL-015
- Vuln IDs
-
- V-35933
- Rule IDs
-
- SV-47249r2_rule
Checks: C-44170r2_chk
Review the organization's policy to ensure wireless NICs are required to be removed prior to use in a classified environment. Verify the site has procedures in place to ensure laptops with wireless NICs are not used for classified data processing. Inquire about laptops/PCs used to process classified information that have embedded wireless NICs. No embedded wireless NICs are allowed, including WLAN, Bluetooth, WMAN, cellular, etc. Ensure the NIC is physically removed. Using methods such as tape or software disabling are not acceptable. Determine if the site either purchased laptops without wireless NICs (Wi-Fi, Bluetooth, WiMax, etc.) or physically removed the NICs from laptops. If the site is using embedded wireless NICs in a classified environment, this is a finding. Recommend to the DAA this is a critical finding requiring immediate action. Note: Does not apply to Communication Systems for Classified (CSfC) Wi-Fi systems.
Fix: F-40457r1_fix
Remove computers with embedded wireless interfaces that cannot be removed from all classified use; these computers must not transfer, receive, store, or process classified information.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001439
- Version
- SRG-MPOL-016
- Vuln IDs
-
- V-35934
- Rule IDs
-
- SV-47250r1_rule
Checks: C-44171r1_chk
Review the organization's access control policy, security procedures addressing wireless implementation, and other relevant documents to ensure the organization has established clear guidance for the implementation of wireless access. If the site does not have clear guidance established for implementation, this is a finding.
Fix: F-40458r1_fix
Establish clear guidance for the implementation of wireless access within the organization's boundaries/enclave/area of responsibility.
- RMF Control
- AC-18
- Severity
- H
- CCI
- CCI-001439
- Version
- SRG-MPOL-017
- Vuln IDs
-
- V-35935
- Rule IDs
-
- SV-47251r1_rule
Checks: C-44172r2_chk
Review the organization's documentation of the wireless system connected to a DoD network to verify DAA approval either by: a.) The accreditation documentation, which must show the wireless system as part of the network diagram or list the system/equipment as being part of the network. b.) DAA approval letter or other document, which must list the system or equipment and date its use is approved. The DAA approval letter or site security plan may be a general statement of approval rather than list each device; however, it does not need to be documented separately from other DAA approval documents for the site network, as long as the approval documents list the wireless system. Verify DAA approval for the type of device used, such as wireless connection services, peripherals, and applications. If wireless systems (including associated peripheral devices, operating system, applications, network/PC connection methods and services) exist and are not approved by the approval authority prior to installation and use for processing DoD information, this is a finding.
Fix: F-40459r2_fix
Obtain DAA approval, documented by memo or site security plan, prior to wireless systems connected to a DoD network being installed or utilized.
- RMF Control
- AC-18
- Severity
- L
- CCI
- CCI-001439
- Version
- SRG-MPOL-018
- Vuln IDs
-
- V-35936
- Rule IDs
-
- SV-47252r2_rule
Checks: C-44173r3_chk
Review the site wireless security policy or wireless remote access policy. Verify it contains information on locations where CMD Wi-Fi access is approved or disapproved. The following locations will be specifically listed in the policy: - DoD/Government site-managed Wi-Fi access point connected to the NIPRNet (Enclave-NIPRNet Connected). - DoD/Government site-managed Wi-Fi access point connected to the Internet only (Internet Gateway Only Connection). - Public Wi-Fi Hotspot. - Hotel Wi-Fi Hotspot. - Home Wi-Fi network (user-managed). DoD CMD will not be used to connect to Public or Hotel Hotspots. If the site policy does not contain the required information on required CMD Wi-Fi security controls, this is a finding. Note: Applies to any Wi-Fi System.
Fix: F-40460r1_fix
Update the CMD Wi-Fi security policy to include information on locations CMD Wi-Fi access is approved or disapproved.
- RMF Control
- AC-18
- Severity
- L
- CCI
- CCI-001439
- Version
- SRG-MPOL-019
- Vuln IDs
-
- V-35937
- Rule IDs
-
- SV-47253r1_rule
Checks: C-44174r1_chk
This check only applies to sites using Bluetooth or ZigBee radios. Verify a written policy or training materials exists stating that Bluetooth (or ZigBee) will be disabled on all applicable devices unless they employ FIPS 140-2 validated cryptographic modules for data in transit. If a policy does not exist or if it does not adequately cover the requirement, this is a finding.
Fix: F-40462r1_fix
Update the policy or training materials to prohibit use of Bluetooth data transmission without FIPS 140-2 validated cryptographic modules.
- RMF Control
- AC-18
- Severity
- H
- CCI
- CCI-001439
- Version
- SRG-MPOL-020
- Vuln IDs
-
- V-35938
- Rule IDs
-
- SV-47254r1_rule
Checks: C-44175r1_chk
Verify the SWLAN system CCAO approval documentation exists, has been approved, and has a SIPRNet Interim Approval to Operate (IATO) or Approval to Operate (ATO) in the GIAP database. Verify the SWLAN system is included in the accreditation documentation and is signed by the DAA. If the SIPRNet connection approval package is not on file with the CCAO, this is a finding.
Fix: F-40463r1_fix
Disable or remove the non-compliant SWLAN until the site has all required approvals for operation.
- RMF Control
- AC-18
- Severity
- L
- CCI
- CCI-001439
- Version
- SRG-MPOL-021
- Vuln IDs
-
- V-35939
- Rule IDs
-
- SV-47255r1_rule
Checks: C-44176r1_chk
Review the site accreditation documentation. Verify that during system design or accreditation process an appropriate WMAN coverage area was determined. Compare the actual radio coverage of the WMAN system with the intended coverage area map. If the actual radio coverage is 10% more than the intended coverage area map, this is a finding.
Fix: F-40464r1_fix
Update coverage map documentation, reconfigure radio power output settings to the previously approved level, or conduct a new risk assessment based on the new coverage area.
- RMF Control
- AC-18
- Severity
- L
- CCI
- CCI-001439
- Version
- SRG-MPOL-022
- Vuln IDs
-
- V-35940
- Rule IDs
-
- SV-47256r1_rule
Checks: C-44177r1_chk
Review the WMAN system data specification sheet (for both access points and bridges). Verify the WMAN system does not operate in the 3.30-3.65 frequency band. If the WMAN system does operate in the 3.30 - 3.65 frequency band, this is a finding.
Fix: F-40465r1_fix
Update the WMAN system to not operate in the 3.30-3.65 GHz frequency band.
- RMF Control
- AC-18
- Severity
- L
- CCI
- CCI-001439
- Version
- SRG-MPOL-023
- Vuln IDs
-
- V-35941
- Rule IDs
-
- SV-47257r1_rule
Checks: C-44178r1_chk
Review the site Incident Response Plan (IRP) or Standard Operating Procedure (SOP) to determine if it includes procedures for reporting unauthorized access, intrusion, jamming, or electromagnetic interference identified during active electromagnetic scanning for wireless systems that connect directly to DoD networks. If the IRP or SOP does not address these requirements, this is a finding.
Fix: F-40466r1_fix
Update the IRP and/or SOP to have the required procedures for reporting the results of WMAN intrusion scans.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001439
- Version
- SRG-MPOL-024
- Vuln IDs
-
- V-35942
- Rule IDs
-
- SV-47258r1_rule
Checks: C-44179r1_chk
Review the WLAN system product documentation (specification sheet, administration manual, etc.). Verify the system is WPA2-Enterprise certified. If the system is not WPA2-Enterprise certified, this is a finding. Note that WPA is the precursor certification to WPA2 and is not sufficient.
Fix: F-40467r1_fix
Update all WLAN equipment and software to WPA2-Enterprise certified for wireless systems that connect directly to DoD networks.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001441
- Version
- SRG-MPOL-028
- Vuln IDs
-
- V-35946
- Rule IDs
-
- SV-47262r1_rule
Checks: C-44183r1_chk
Review the organization's access control and security policy, procedures addressing wireless implementation, information system configuration settings, restrictions, and any other associated documentation. The objective is to ensure the organization's wireless security policy requires all wireless systems be authorized prior to connection. If wireless access is not authorized prior to connection, this is a finding.
Fix: F-40471r1_fix
Establish a wireless access control and security policy to define the administrative procedures and technical requirements to be met prior to being authorized to connect to an organization's information system(s).
- RMF Control
- AC-18
- Severity
- L
- CCI
- CCI-001441
- Version
- SRG-MPOL-029
- Vuln IDs
-
- V-35947
- Rule IDs
-
- SV-47263r1_rule
Checks: C-44184r2_chk
Review the site's wireless equipment list and verify all minimum data elements listed below are included in the equipment list. This check applies to any wireless end user device (e.g., CMD, Wi-Fi network interface card) and wireless network devices (e.g., access point, authentication server). The list of approved wireless devices will be stored in a secure location and will include the following at a minimum: For CMDs: - Manufacturer, model number, and serial number of wireless equipment. - Equipment location or who the device was issued to. - Assigned users with telephone numbers and email addresses. Verify all wireless devices used at the site, including infrared mice/keyboards, are included: - Access point Media Access Control (MAC) address (WLAN only). - Access point IP address (WLAN only). - Wireless client MAC address. - Network DHCP range (WLAN & WWAN only). - Type of encryption enabled. - Access point SSID (WLAN only). - Manufacturer, model number, and serial number of wireless equipment. - Equipment location - Assigned users with telephone numbers. Verify procedures are in place for ensuring the list is kept up to date. If the equipment list does not exist, all data elements are not tracked, or the list is outdated, this is a finding.
Fix: F-40472r1_fix
Maintain a list of all DAA-approved WLAN devices under the organization's control. The list must be updated as devices are commissioned, and contain the data elements required.
- RMF Control
- AC-18
- Severity
- L
- CCI
- CCI-001441
- Version
- SRG-MPOL-030
- Vuln IDs
-
- V-35948
- Rule IDs
-
- SV-47264r2_rule
Checks: C-44185r3_chk
Review the site security plan. Wireless network devices, such as access points, laptops, CMDs, and wireless peripherals (keyboards, pointers, etc.) using a wireless network protocol, such as Bluetooth, Wi-Fi, or proprietary protocols must be documented in the site security plan. A general statement in the site security plan permitting the various types of wireless network devices used by the site is acceptable rather than a by-model listing, for example, "wireless devices of various models are permitted as long as they are configured in accordance with the Wireless STIG". If a DAA-approved site security plan does not exist or if it has not been updated, this is a finding.
Fix: F-40473r2_fix
Update the site security plan to include all devices connecting directly or indirectly (data synchronization) to the network.
- RMF Control
- AC-18
- Severity
- L
- CCI
- CCI-001441
- Version
- SRG-MPOL-031
- Vuln IDs
-
- V-35949
- Rule IDs
-
- SV-47265r1_rule
Checks: C-44186r1_chk
Interview the site wireless device administrator and determine if the site has a wireless remote access policy (or a wireless section in a general remote access policy). Verify the policy has been signed by the site DAA, Commander, Director, or other appropriate manager(s). If a wireless remote access policy does not exist or is not signed, this is a finding.
Fix: F-40474r1_fix
Develop a Wireless Remote Access Policy and have it signed by the site DAA, Commander, Director, or other appropriate authority.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001441
- Version
- SRG-MPOL-032
- Vuln IDs
-
- V-35950
- Rule IDs
-
- SV-47266r1_rule
Checks: C-44187r1_chk
Review local documentation to verify the local CTTA has been notified of the site's intent to install and operate a SWLAN. If the local CTTA has not been notified, this is a finding.
Fix: F-40475r1_fix
Confirm and document the local CTTA has been notified of the site's intent to install and operate a SWLAN.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001442
- Version
- SRG-MPOL-035
- Vuln IDs
-
- V-35953
- Rule IDs
-
- SV-47269r1_rule
Checks: C-44190r1_chk
Review the site's network access policy and associated documentation and determine if the implemented solution supports all wireless clients and devices. If the network access control solution does not support wireless clients, this is a finding.
Fix: F-40478r1_fix
Update the network access control solution to support all wireless clients and devices.
- RMF Control
- AC-19
- Severity
- H
- CCI
- CCI-001330
- Version
- SRG-MPOL-037
- Vuln IDs
-
- V-35955
- Rule IDs
-
- SV-47271r1_rule
Checks: C-44192r1_chk
Verify written policy and training material exists (or requirement is listed on a signed user agreement) stating CMDs must not be used to transmit classified information. If written policy or training material, stating CMDs must not be used to receive, transmit, or process classified information, does not exist, this is a finding.
Fix: F-40482r1_fix
Develop and publish policy preventing CMDs from processing, sending, receiving, or storing classified data.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-001330
- Version
- SRG-MPOL-038
- Vuln IDs
-
- V-35956
- Rule IDs
-
- SV-47272r1_rule
Checks: C-44193r1_chk
Review documentation and verify the following. Ask for documentation showing the CTTA was consulted about operation and placement of wireless devices. Acceptable proof would be the signature or initials of the CTTA on the architecture diagram or other evidence of coordination. In accordance with DoD policy, the CTTA must have a written separation policy for each classified area; review written policies, training material, or user agreements to see if wireless usage in these areas is addressed; and verify proper procedures for wireless device use in classified areas is addressed in training programs. If any of the following are identified, this is a finding: - CTTA has not designated a separation distance in writing. - DAA has not coordinated with the CTTA. - Users are not trained or made aware (using signage or user agreement) of procedures for wireless device usage in and around classified processing areas. - Site does not have a written procedure prohibiting the use of wireless devices in areas where classified data processing occurs.
Fix: F-40483r1_fix
Do not permit operation of wireless devices in areas where classified information is electronically stored, processed, or transmitted unless operation is in accordance with DAA-approved CTTA restrictions at the site.
- RMF Control
- AC-19
- Severity
- H
- CCI
- CCI-001331
- Version
- SRG-MPOL-040
- Vuln IDs
-
- V-35958
- Rule IDs
-
- SV-47274r1_rule
Checks: C-44195r1_chk
Verify compliance by reviewing the user agreement or security briefing to ensure personnel have been properly instructed on the policy that states that wireless PAN devices cannot be used for, or around classified processing. If the user agreement or security briefing does not exist, this is a finding. Note: The check applies to Wireless USB (WUSB) devices; however, it does not apply to wireless email devices (BlackBerry, Windows Mobile, etc.). Review the appropriate wireless email device security requirements for Bluetooth on these devices.
Fix: F-40485r1_fix
Develop and publish a policy forbidding the use of wireless PAN devices for classified processing.
- RMF Control
- AC-19
- Severity
- H
- CCI
- CCI-001332
- Version
- SRG-MPOL-042
- Vuln IDs
-
- V-35960
- Rule IDs
-
- SV-47276r1_rule
Checks: C-44197r1_chk
CMDs and tablets classified as non-enterprise activated are not authorized to connect to DoD networks. Examples of unauthorized DoD network connections include: -Connecting the mobile device to a DoD network interface device (switch, router, Wi-Fi access point, etc.). Allowed exception: the device can be connected to a DoD managed Internet-Gateway-only connected Wi-Fi access point (AP) (see the Wireless STIG for more information). -Connecting the mobile device to a DoD PC that is authorized to connect to a DoD network. - Managing the mobile device from a DoD network connected Mobile Device Management (MDM) server. -Connecting the mobile device to a web server located on a DoD network, unless the server is available to the general public. -Connecting the mobile device to a DoD email system. Interview the appropriate security personnel and 2-3 users who are using mobile OS devices that are managed by the site, and which are not authorized to connect to DoD networks. Verify written policy and training material exists (or requirement is listed on a signed user agreement) stating mobile OS devices must not be connected to a DoD network, unless authorized to do so. Verify users are aware of the requirement. If written policy or training material does not exist or users are not aware of the requirement, this is a finding.
Fix: F-40487r1_fix
Develop and publish the policy or procedure preventing connection of CMDs and tablets classified as non-enterprise activated to DoD networks and users are trained on the requirement.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-001332
- Version
- SRG-MPOL-043
- Vuln IDs
-
- V-35961
- Rule IDs
-
- SV-47277r1_rule
Checks: C-44198r1_chk
Review the organization's policy on non-enterprise activated CMD processing and storage requirements. The policy should include language that disallows the use of such devices in processing or storing anything other than non-sensitive DoD information. The devices will not be used to connect to DoD email systems, including Outlook Web Access (OWA), or store or process DoD email. If the policy does not disallow the use of CMDs for processing anything other than non-sensitive information, including DoD email, this is a finding.
Fix: F-40488r1_fix
Develop and publish the policy or procedure preventing the processing or storing of DoD sensitive information, including DoD email, by non-enterprise activated CMDs.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-001334
- Version
- SRG-MPOL-044
- Vuln IDs
-
- V-35962
- Rule IDs
-
- SV-47278r1_rule
Checks: C-44199r1_chk
Review the organization's access control and security policy, documentation for random inspections of mobile devices, and other relevant documents or records. Organizational personnel responsible for randomly reviewing/inspecting mobile devices and the information stored on those devices; and organizational personnel using mobile devices in facilities containing information systems processing, storing, or transmitting classified information, will be interviewed. Ensure the organization has established a requirement for mobile devices to be randomly reviewed/inspected to ensure compliance with the organization's access control policy regarding the use of mobile devices within its facilities. If a policy or procedure is not in place for random reviews or inspections, this is a finding.
Fix: F-40489r1_fix
Develop and publish a requirement for mobile devices to be randomly reviewed/inspected for compliance with the organization's access control policy regarding the use of mobile devices within its facilities containing information systems processing, storing, or transmitting classified information, and the information stored on those devices.
- RMF Control
- AC-19
- Severity
- L
- CCI
- CCI-001334
- Version
- SRG-MPOL-045
- Vuln IDs
-
- V-35963
- Rule IDs
-
- SV-47279r1_rule
Checks: C-44200r1_chk
Review the organization's access control and security policy and documentation for manual inspections of non-enterprise activated mobile devices. Organizational personnel responsible for reviewing/inspecting non-enterprise activated CMDs and organizational personnel using the CMDs, will be interviewed. Ensure the organization has established a requirement for CMDs to be manually reviewed/inspected to ensure compliance with the organization's access control policy regarding the use of mobile devices within its facilities, to include determination if unauthorized software is, or has been, running on the device or if the device OS has been modified (e.g., rooted or jailbroken). If a policy or procedure is not in place for manual reviews or inspections, this is a finding.
Fix: F-40490r1_fix
Manually audit non-enterprise activated CMDs, in person, to determine if unauthorized software is, or has been, running on the device, or if the device OS has been modified (e.g., rooted or jailbroken), when centralized over-the-air auditing is unavailable.
- RMF Control
- AC-19
- Severity
- L
- CCI
- CCI-001334
- Version
- SRG-MPOL-046
- Vuln IDs
-
- V-35964
- Rule IDs
-
- SV-47280r1_rule
Checks: C-44201r1_chk
Verify the security personnel of the site where the MDM server is located, is tracking whether local/remote sites (where CMDs are provisioned, issued, and managed) are conducting annual self assessments. Command-level action should be considered for local sites not complying with security requirements for the provisioning, issuance, and managements of CMDs. If required annual self assessments have not been completed by the site, this is a finding.
Fix: F-40491r1_fix
Conduct annual self assessments where CMDs are provisioned, issued, and managed.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-001334
- Version
- SRG-MPOL-047
- Vuln IDs
-
- V-35965
- Rule IDs
-
- SV-47281r1_rule
Checks: C-44202r1_chk
Verify the security personnel or system administrator is maintaining an integrity baseline scan of the mobile device operating system and applications. If an integrity baseline is not maintained, this is a finding.
Fix: F-40492r1_fix
Maintain an integrity system baseline of the mobile device.
- RMF Control
- AC-19
- Severity
- L
- CCI
- CCI-001334
- Version
- SRG-MPOL-048
- Vuln IDs
-
- V-35966
- Rule IDs
-
- SV-47282r1_rule
Checks: C-44203r1_chk
Verify the security personnel or system administrator is saving records of scan results and mitigation actions for the length of time designated by the site security manager (which must be a minimum of 6 months, one year recommended). If results of scans are not maintained by the site for 6 months, this is a finding.
Fix: F-40493r1_fix
Maintain the results and mitigation actions from integrity tool validation scans on CMDs, for at least 6 months.
- RMF Control
- AC-19
- Severity
- L
- CCI
- CCI-001334
- Version
- SRG-MPOL-049
- Vuln IDs
-
- V-35967
- Rule IDs
-
- SV-47283r1_rule
Checks: C-44204r1_chk
Verify the organization has saved its scan results for at least 6 months (one year recommended), viewing one of the older logs to validate the practice. If the organization is not saving the wireless IDS scan results, or is saving them for less than 6 months, this is a finding.
Fix: F-40494r1_fix
Maintain the results of wireless IDS sensor scan results for at least 6 months.
- RMF Control
- AC-19
- Severity
- L
- CCI
- CCI-001334
- Version
- SRG-MPOL-050
- Vuln IDs
-
- V-35968
- Rule IDs
-
- SV-47284r1_rule
Checks: C-44205r1_chk
Verify a procedure is in place to have mobile OS device integrity tool scans reviewed daily by the system administrator or security personnel, or continuously by a server. If tool scans are not reviewed daily, or continuously by a server, this is a finding.
Fix: F-40495r1_fix
Review MDM integrity tool scans daily by the system administrator or security personnel, or continuously by a server.
- RMF Control
- AC-19
- Severity
- H
- CCI
- CCI-001458
- Version
- SRG-MPOL-052
- Vuln IDs
-
- V-35970
- Rule IDs
-
- SV-47286r1_rule
Checks: C-44207r1_chk
Review the organization's access control and security policy, incident handling procedures, and any other relevant documents. Ensure the organization has defined an incident handling policy with specific actions to be implemented when classified information has been found on mobile devices. Determine if the site has had a data spill within the previous 24 months. If yes, review written records, incident reports, and/or after action reports and determine if required procedures were followed. If the incident handling policy is not being followed, this is a finding.
Fix: F-40497r1_fix
Follow all incident handling policy actions to be taken when classified information has been identified on mobile devices.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-001458
- Version
- SRG-MPOL-053
- Vuln IDs
-
- V-35971
- Rule IDs
-
- SV-47287r2_rule
Checks: C-44208r1_chk
Verify classified incident handling, response, and reporting procedures are documented in CMD procedures or security policies. If classified incident handling, response, and reporting procedures are not documented in site procedures or security policies, this is a finding. This requirement applies at both sites where CMDs are issued and managed and at sites where the CMD management server is located. At the CMD management server site, verify Incident Handling and Response procedures include actions to sanitize the CMD management server and email servers (e.g., Exchange, Oracle mail). At CMD sites, verify Incident Handling and Response procedures include actions for incident reporting and actions to safeguard classified CMD devices. The following actions will be followed for all CMD involved in a data spill: -BlackBerry CMDs: follow procedures in the DoD Data Spill Procedures Guide for BlackBerry CMDs located at http://iase.disa.mil/stigs/net_perimeter/wireless/CMD.html. -Windows Mobile, Android, and iOS CMDs: the CMD will be destroyed.
Fix: F-40498r1_fix
Create and publish an SOP for CMI on CMDs.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000082
- Version
- SRG-MPOL-055
- Vuln IDs
-
- V-35973
- Rule IDs
-
- SV-47289r1_rule
Checks: C-44210r1_chk
Review the organization's policy to determine if it provides information on allowed personal use of site/Command mobile devices. The policy will be approved by the DAA based on a risk-based assessment. The policy must include: -Installation of user-owned and free commercial applications. -Download of user-owned data (music files, picture files, etc.). -Connections to user social media accounts. -The use of geo-location aware applications that save or transmit the location of the device. The use of geo-location aware applications should be based on an Operational Security (OPSEC) risk assessment. -Connecting DoD managed mobile devices to personally-owned computers. (For example, a personally owned computer used to download personally-owned files to the mobile device). If the organization does not have a Mobile Device Personal Use Policy detailing the requirements for downloading user owned data (music files, pictures, etc.) on the mobile device, this is a finding.
Fix: F-40500r1_fix
Develop a Personal Use Policy which details the requirements for downloading user owned data (music files, picture files, etc.) on the mobile device.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000082
- Version
- SRG-MPOL-056
- Vuln IDs
-
- V-35974
- Rule IDs
-
- SV-47290r1_rule
Checks: C-44211r1_chk
Review the organization's policy to determine if it provides information on allowed personal use of DoD component mobile devices in respect to viewing or downloading personal email. The policy will be approved by the DAA based on a risk based assessment. If the organization does not have a policy on allowed personal use covering viewing or downloading personal email, this is a finding.
Fix: F-40501r1_fix
Develop a Mobile Device Personal Use Policy which details the requirements for the operating system device to view or download personal email.
- RMF Control
- AC-19
- Severity
- L
- CCI
- CCI-000082
- Version
- SRG-MPOL-057
- Vuln IDs
-
- V-35975
- Rule IDs
-
- SV-47291r1_rule
Checks: C-44212r1_chk
Determine if the site has a Personal Use Policy for site/Command-managed or owned CMDs. The policy must include: -Installation of user-owned and free commercial applications. -Viewing and/or downloading personal email. -Download of user-owned data (music files, picture files, etc.). -Connections to user social media accounts. -The use of geo-location aware applications that save or transmit the location of the device. The use of geo-location aware applications should be based on an Operational Security (OPSEC) risk assessment. -Connecting DoD managed mobile devices to personally-owned computers. (For example, a personally owned computer used to download personally-owned files to the mobile device.) Verify the policy has been signed or otherwise approved by the site DAA. If a Personal Use Policy for site/Command managed or owned CMDs does not exist or is not approved by the DAA, this is a finding.
Fix: F-40502r1_fix
Create and publish a Personal Use Policy for DoD component managed or owned CMDs and obtain DAA approval of the policy.
- RMF Control
- AC-19
- Severity
- H
- CCI
- CCI-000082
- Version
- SRG-MPOL-058
- Vuln IDs
-
- V-35976
- Rule IDs
-
- SV-47292r1_rule
Checks: C-44213r1_chk
Review the organization's published implementation guidance on the use of non-enterprise activated CMDs to determine if DoD software certificates are prohibited from being utilized on the devices. If DoD software certificates are not prohibited, this is a finding.
Fix: F-40503r1_fix
Publish the organization’s implementation guidance prohibiting the use of DoD-issued software certificates on non-enterprise activated CMDs.
- RMF Control
- AC-19
- Severity
- L
- CCI
- CCI-000082
- Version
- SRG-MPOL-059
- Vuln IDs
-
- V-35977
- Rule IDs
-
- SV-47293r1_rule
Checks: C-44214r1_chk
Review site's physical security policy. Verify the site addresses CMDs with embedded cameras. If there is no written physical security policy outlining whether CMDs with cameras are permitted or prohibited on or in the DoD facility, this is a finding.
Fix: F-40504r1_fix
Update the security documentation to include a statement of whether CMDs with cameras (still and video) are allowed in the facility.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000083
- Version
- SRG-MPOL-061
- Vuln IDs
-
- V-35979
- Rule IDs
-
- SV-47295r1_rule
Checks: C-44216r1_chk
Review the organization's policy and procedures for provisioning mobile operating systems and applications. Determine if there are requirements to ensure integrity mechanisms protecting the confidentiality of OTA provisioning. Appropriate integrity mechanisms generally involve the use of FIPS-validated cryptographic modules implementing algorithms that provide integrity services. If there are no requirements in the policies or procedural documentation for these mechanisms, this is a finding.
Fix: F-40506r1_fix
Establish standard operating procedures for provisioning mobile devices to include integrity mechanisms protecting the confidentiality of OTA provisioning.
- RMF Control
- AC-19
- Severity
- L
- CCI
- CCI-000083
- Version
- SRG-MPOL-062
- Vuln IDs
-
- V-35980
- Rule IDs
-
- SV-47296r1_rule
Checks: C-44217r1_chk
Review the policy to ensure a procedure is in place for a CMD system administrator to perform a Wipe command on all new or reissued CMDs (e.g., reset to factory configuration), reload system software or updates, and load a DoD compliant security policy on the CMD before issuing it to DoD personnel and placing the device on a DoD network. Verify required procedures are followed. If required procedures are not followed, this is a finding.
Fix: F-40507r1_fix
Develop a policy which ensures CMD system administrators perform a wipe command on all new or reissued CMDs and an approved IT policy is pushed to the device before issuing it to DoD personnel.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000083
- Version
- SRG-MPOL-063
- Vuln IDs
-
- V-35981
- Rule IDs
-
- SV-47297r1_rule
Checks: C-44218r1_chk
Review the site's procedure/policy on software updates for CMDs and ensure it includes a requirement for updates to be obtained from a DoD approved source. Verify the site CMD handheld administrator and the CMD management server administrator are aware of the requirement. Determine what procedures are used at the site for installing software updates on site-managed CMDs. If the site does not have procedures in place for users to down-load software updates from only a DoD approved source, this is a finding.
Fix: F-40508r1_fix
Develop policy requiring CMD software updates originate from DoD approved sources.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000083
- Version
- SRG-MPOL-064
- Vuln IDs
-
- V-35982
- Rule IDs
-
- SV-47298r1_rule
Checks: C-44219r2_chk
Verify the DAA has approved the use of software certificates only until approved CAC readers are available and can be purchased and fielded by the site. Software certificates are only permissible when smart card readers are unavailable and only permissible until they are available. If user software certificates are used on site managed CMDs instead of the CAC, verify the DAA has approved their use (in a letter, memo, site security plan, etc.) and that a DoD approved CAC reader is not available for the CMD. If the site uses software certificates on site managed CMDs and the DAA has not approved their use, this is a finding.
Fix: F-40509r1_fix
Obtain DAA approval for the use of software certificates or purchase approved CAC readers for enterprise-activated CMDs.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000083
- Version
- SRG-MPOL-065
- Vuln IDs
-
- V-35983
- Rule IDs
-
- SV-47299r1_rule
Checks: C-44220r1_chk
Determine if a policy is in place to ensure only DoD managed IM servers are used for the IM service on site-managed CMDs. If a policy is not in place to ensure the IM server the CMD IM applications connect to is not managed by a DoD site, this is a finding.
Fix: F-40510r1_fix
Develop policy to require Instant Messaging (IM) client applications connect only to a security-compliant, DoD-controlled IM server.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000083
- Version
- SRG-MPOL-066
- Vuln IDs
-
- V-35984
- Rule IDs
-
- SV-47300r1_rule
Checks: C-44221r1_chk
Review the policy to determine if all non-core mobile OS applications are required to have DAA or Command IT Configuration Control Board approval prior to installation. If DAA or Command IT CCB approval is not required or, if required, not obtained prior to installation on a CMD, this is a finding.
Fix: F-40511r1_fix
Obtain DAA or Command IT CCB approval prior to installing non-core applications on CMDs.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000083
- Version
- SRG-MPOL-067
- Vuln IDs
-
- V-35985
- Rule IDs
-
- SV-47301r1_rule
Checks: C-44222r1_chk
Determine if any non-core mobile OS applications have been approved by the DAA. If no non-core mobile OS applications have been approved by the DAA, this check is not applicable. Ask the site for documentation showing what security risk analysis procedures are used by the DAA prior to approving non-core applications for use. Determine if the security risk analysis includes the following: -What OS level permissions are required by the application? -The application does not contain malware. -The application does not share data stored on the CMDs with non-DoD servers. -If the application stores sensitive data, the application data storage container is FIPS 140-2 validated. If the application security risk review procedures do not contain the required risk assessment evaluation tasks, this is a finding.
Fix: F-40512r1_fix
Perform a security risk analysis on a mobile operating system (OS) application prior to the application being approved for use.
- RMF Control
- AC-19
- Severity
- H
- CCI
- CCI-000083
- Version
- SRG-MPOL-069
- Vuln IDs
-
- V-35987
- Rule IDs
-
- SV-47303r1_rule
Checks: C-44224r1_chk
Review the organization’s patch procedure and policy to determine if mobile operating systems, mobile applications, and mobile device management agents on managed mobile devices are updated within an organization defined period after the updates/patches are available. If the organization is not updating or patching within the organization defined period of time, this is a finding.
Fix: F-40514r1_fix
Develop procedures to update mobile operating systems, mobile applications, and mobile device management agents on managed mobile devices within the organization defined period after the updates or patches are available.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000084
- Version
- SRG-MPOL-070
- Vuln IDs
-
- V-35988
- Rule IDs
-
- SV-47304r1_rule
Checks: C-44225r1_chk
Review the organization's access control and security policy and procedures addressing access control and authorization process for portable and mobile devices. Ensure the organization has developed and published an authorization process to be performed on each mobile device before the device can connect to the organization's information system(s). This authorization process will ensure the mobile device complies with all organization-published usage restrictions and implementation guidance. If an authorization process has not been developed and published, this is a finding.
Fix: F-40515r1_fix
Develop and publish an authorization process to be performed on each mobile device before the device can connect to the organization's information system(s).
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-001456
- Version
- SRG-MPOL-072
- Vuln IDs
-
- V-35990
- Rule IDs
-
- SV-47306r1_rule
Checks: C-44227r1_chk
Review the organization's security policy and procedures to ensure the organization has developed and documented a list of high risk locations, and has published this list to its security staff and other organizational personnel. Also examine the date of last update to ensure the list is periodically reviewed and updated. Interview organization security staff to determine if a high risk location list exists and if it is periodically reviewed and updated. If the organization has not developed and disseminated a list of high risk locations, this is a finding.
Fix: F-40517r1_fix
Develop and document a list of high risk locations, and publish this list to security staff and other organizational personnel.
- RMF Control
- AC-19
- Severity
- M
- CCI
- CCI-000089
- Version
- SRG-MPOL-074
- Vuln IDs
-
- V-35992
- Rule IDs
-
- SV-47308r1_rule
Checks: C-44229r1_chk
Interview organization personnel to ensure high risk mobile device inspection and preventive measures are understood, executed, and an audit trail is maintained to document actions taken for each high risk mobile device. NOTE: Inspections should be completed before returning devices are connected to a DoD network. If inspection and preventative measures are not employed for devices returning from high risk locations, this is a finding.
Fix: F-40519r1_fix
Document the inspection and preventive measures applied to each mobile device returning from a high risk location, ensuring organization defined inspection and preventative measures are being applied.
- RMF Control
- AT-1
- Severity
- M
- CCI
- CCI-000103
- Version
- SRG-MPOL-075
- Vuln IDs
-
- V-35993
- Rule IDs
-
- SV-47309r1_rule
Checks: C-44230r1_chk
CMDs classified as non-enterprise activated are not authorized to send, receive, store, or process sensitive DoD information or connect to DoD networks. Interview the security personnel and 2-3 users who are using mobile devices that are managed by the site, and which are not authorized to connect to DoD networks. Verify written policy and training material exists (or requirement is listed on a signed user agreement) stating mobile devices must not be used to send, receive, store, or process sensitive or classified DoD data/information or connect to DoD networks. If written policy or training material does not exist or users are not aware of the requirement, this is a finding.
Fix: F-40520r1_fix
Develop a written policy and training material that states CMDs classified as non-enterprise activated must not be used to send, receive, store, or process sensitive/FOUO or classified data and information or connect to DoD networks.
- RMF Control
- AT-1
- Severity
- M
- CCI
- CCI-000103
- Version
- SRG-MPOL-076
- Vuln IDs
-
- V-35994
- Rule IDs
-
- SV-47310r1_rule
Checks: C-44231r1_chk
CMDs classified as non-enterprise activated are not authorized to access DoD networks or store or process sensitive DoD information. Interview the security personnel and 2-3 users who are using mobile OS devices that are managed by the site, and which are not authorized to connect to DoD email systems. Verify written policy and training material exists (or requirement is listed on a signed user agreement) stating mobile devices must not be used to connect to a DoD email system. If written policy and training material does not exist or users are not aware of the requirement, this is a finding.
Fix: F-40521r1_fix
Develop a written policy and training material that states CMDs classified as non-enterprise activated must not access DoD email systems.
- RMF Control
- AT-2
- Severity
- L
- CCI
- CCI-000106
- Version
- SRG-MPOL-077
- Vuln IDs
-
- V-35995
- Rule IDs
-
- SV-47311r1_rule
Checks: C-44232r1_chk
This requirement applies to all CMDs. All CMD users must receive required training on the following topics before they are provided a mobile device or allowed access to DoD networks with a mobile device. Training is divided into two groups: Group A (general topics) and Group B (device specific topics). DISA’s CMD security course satisfies the requirement for Group A training topics. The course is located at: http://iase.disa.mil/eta/CMD_tablet_v1/launchpage.htm. Group A – General Topics a. Requirement that personally-owned PEDs are not used to transmit, receive, store, or process DoD information unless approved by the DAA and the owner signs forfeiture agreement in case of a security incident. b. Procedures for wireless device usage in and around classified processing areas. c. Requirement that PEDs with digital cameras (still and video) are not allowed in any SCIF or other areas where classified documents or information is stored, transmitted, or processed. d. Procedures for a data spill. e. Requirement that wireless email devices and systems are not used to send, receive, store, or process classified messages (does not apply to the SME PED). f. Requirement that CMDs and systems will not be connected to classified DoD networks or information systems. g. Requirement that a user immediately notify appropriate site contacts (i.e., IAO, CMD management server administrator, supervisor, etc.) when his/her CMD has been lost or stolen. h. Secure Bluetooth Smart Card Reader (SCR) usage: --Secure pairing procedures. --Perform secure pairing immediately after the SCR is reset. --Accept only Bluetooth connection requests from devices they control. --Monitor Bluetooth connection requests and activity in order to detect possible attacks and unauthorized activity. i. Procedures on how to sign and encrypt email. j. If Short Message Service (SMS) and/or Multi-media Messaging Service (MMS) are used, IA awareness training material should include SMS/MMS security issues. k. Requirement that Over-The-Air (OTA) wireless software updates should only come from DoD approved sources. l. When CMD Wi-Fi Service is used, the following training will be completed: --Procedures for setting up a secure Wi-Fi connection and verifying the active connection is to a known access point. --Approved connection options (i.e., enterprise, home, etc.). --Requirements for home Wi-Fi connections. --The Wi-Fi radio will be disabled by the user whenever a Wi-Fi connection is not being used. --The Wi-Fi radio must never be enabled while the CMD is connected to a PC. m. Do not discuss sensitive or classified information on non-secure (devices not FIPS 140-2 certified or NSA Type-1 certified for voice) cellular phones, cordless phones, and two-way radios used for voice communications. n. Do not connect PDAs, CMDs, and tablets to any workstation that stores, processes, or transmits classified data. (Exception: SME PED). o. The installation of user owned applications, including geo-location aware applications, on the mobile device will be based on the Command’s Mobile Device Personal Use Policy. p. The use of the mobile OS device to view and/or download personal email will be based the Command’s Mobile Device Personal Use Policy. q. The download of user owned data (music files, picture files, etc.) on the mobile device will be based the Command’s Mobile Device Personal Use Policy. r. The use of the mobile device to connect to user social media web accounts will be based the Command’s Mobile Device Personal Use Policy. s. When the Bluetooth radio is authorized for use with an approved smartcard reader or handsfree headset, the user will disable the Bluetooth radio whenever a Bluetooth connection is not being used. t. All radios on the mobile device (Wi-Fi, Bluetooth, near-field communications (NFC)) must be turned off when not needed. u. Procedure on how to disable Location Services on the device. Location Services must be disabled for all applications or enabled only for applications approved by the DAA for location based services. Group B – Device Specific Topics Add device specific training requirements based on specific devices used. Check Procedures: - Review site CMD training material to see if it contains the required content. NOTE: Some training content may be listed in the User Agreement signed by the user. - Verify site training records show that CMD users received required training and training occurred before the user was issued a CMD. Check training records for approximately five users, picked at random. Mark as a finding if training material does not contain required content.
Fix: F-40522r1_fix
Develop and publish policy mandating users complete the required training prior to accessing a DoD network with a CMD.
- RMF Control
- AT-2
- Severity
- L
- CCI
- CCI-001479
- Version
- SRG-MPOL-078
- Vuln IDs
-
- V-35996
- Rule IDs
-
- SV-47312r1_rule
Checks: C-44233r1_chk
Verify the MDM server administrator(s) has received annual required training. The site should document when the training was completed. The MDM server administrator must be trained on the following requirements: -Administrative service accounts will not be used to log into the MDM server or any server service. -Activation passwords or PINs will consist of a pseudo-random pattern of at least eight characters consisting of at least two letters and two numbers. A new activation password must be selected each time one is assigned (e.g., the same password cannot be used for all users or for a group of users). - User and group accounts on the CMD management server will always be assigned a STIG-compliant security/IT policy. If the MDM server admin did not receive required training annually, this is a finding.
Fix: F-40523r1_fix
Develop and publish policy mandating the MDM administrator completes and documents his/her training annually.
- RMF Control
- AT-3
- Severity
- M
- CCI
- CCI-001566
- Version
- SRG-MPOL-079
- Vuln IDs
-
- V-35997
- Rule IDs
-
- SV-47313r1_rule
Checks: C-44234r1_chk
Review the site's training policy to determine if users are required to complete OPSEC training for the use of non-enterprise activated CMDs. If non-enterprise activated CMD users are not required to complete OPSEC training, this is a finding.
Fix: F-40524r1_fix
Develop and publish policy mandating all non-enterprise activated CMD users complete Operational Security (OPSEC) training that provides use guidelines and vulnerability mitigation techniques.
- RMF Control
- AT-4
- Severity
- L
- CCI
- CCI-000114
- Version
- SRG-MPOL-080
- Vuln IDs
-
- V-35998
- Rule IDs
-
- SV-47314r1_rule
Checks: C-44235r1_chk
Review site CMD training and verify training records show that users received required training, and that training occurred before the user was issued a CMD. All CMD users must receive required training annually and prior to issuance. If training records do not show users receiving required training prior to issuance and at least annually, this is a finding.
Fix: F-40525r1_fix
Develop required training for all users to complete annually and prior to being issued CMDs.
- RMF Control
- IR-6
- Severity
- L
- CCI
- CCI-000836
- Version
- SRG-MPOL-081
- Vuln IDs
-
- V-35999
- Rule IDs
-
- SV-47315r1_rule
Checks: C-44236r1_chk
Determine if any site mobile devices were reported lost or stolen within the previous 24 months. If yes, review written records, incident reports, and/or after action reports and determine if required procedures were followed. If the site had a lost or stolen mobile device within the previous 24 months and required procedures were not followed, this is a finding.
Fix: F-40526r1_fix
Follow required actions when a CMD is reported lost or stolen.
- RMF Control
- IR-8
- Severity
- L
- CCI
- CCI-000843
- Version
- SRG-MPOL-082
- Vuln IDs
-
- V-36000
- Rule IDs
-
- SV-47316r1_rule
Checks: C-44237r1_chk
Interview the appropriate security personnel and review the site's Incident Response Plan or other policies to determine if the site has a written plan of action and procedures for lost or stolen CMDs. If the site's Incident Response Plan (IRP) does not include a written plan of action following a lost or stolen CMD, this is a finding.
Fix: F-40527r1_fix
Create and publish SOP to follow in the event a CMD is lost or stolen.
- RMF Control
- MP-6
- Severity
- L
- CCI
- CCI-001028
- Version
- SRG-MPOL-083
- Vuln IDs
-
- V-36001
- Rule IDs
-
- SV-47317r1_rule
Checks: C-44238r1_chk
This requirement applies to mobile operating system (OS) CMDs. Prior to disposing of a CMD or if the CMD is transferred to another DoD or government agency, follow the disposal procedures found in the appropriate security implementation guide for the CMD of interest. Verify proper procedures are being followed and the procedures are documented. Check to see how retired, discarded, or transitioned CMDs were disposed of during the previous 6 - 12 months and verify compliance with requirements. If procedures are not documented or if documented, they were not followed, this is a finding.
Fix: F-40528r1_fix
Prior to disposing of a CMD or transitioning it to another user, either in DoD or another agency, follow required procedures.
- RMF Control
- PE-3
- Severity
- M
- CCI
- CCI-000928
- Version
- SRG-MPOL-084
- Vuln IDs
-
- V-36002
- Rule IDs
-
- SV-47318r1_rule
Checks: C-44239r1_chk
Ensure all network devices (e.g., IDS, routers, servers, Remote Access System (RAS), firewalls, WLAN access points, etc.) are located in a secure room with limited access or otherwise secured to prevent tampering or theft. For WLAN Access Points: Determine if the WLAN network component of the WLAN system (e.g., access point or bridge) is installed in an unprotected public area where unauthorized personnel can get access to the device. The physical Security Officer may be able to assist in this determination. If yes, the following requirements apply: Note: Access points installed above ceiling tiles in a controlled access area or installed 30 feet above the ground in a controlled access hanger can be considered to be installed in a protected non-public area. The site physical Security Officer should make a determination if a WLAN device installation location should be considered to be an unprotected public area. Determine if the WLAN device has been validated as meeting FIPS 140-2 Level 2, at a minimum, or physically secured by placing it inside a securely mounted, pick-resistant, and lockable enclosure. If the requirements above are not met, this is a finding.
Fix: F-40529r1_fix
Place all network devices (i.e., Intrusion Detection System (IDS), routers, Remote Access System (RAS), firewalls, etc.) in a secure room with limited access or otherwise secure to prevent tampering or theft.
- RMF Control
- PE-3
- Severity
- M
- CCI
- CCI-000928
- Version
- SRG-MPOL-085
- Vuln IDs
-
- V-36003
- Rule IDs
-
- SV-47319r1_rule
Checks: C-44240r1_chk
Review the physical security controls of the SWLAN access points. - Verify site SWLAN access points are physically secured. - Verify there is some method for alerting site security if the access point has been tampered with. - Determine if site SWLAN access points are in locations that provide limited access to only authorized personnel who are approved to access the access points. - Determine how the site conducts a daily physical inventory of SWLAN access points. Verify that required inventory methods are used, depending on whether the access points are stored in a COMSEC container. If physical security controls are not implemented for SWLAN access points, this is a finding.
Fix: F-40530r1_fix
Implement required physical security controls for the SWLAN.
- RMF Control
- PS-6
- Severity
- L
- CCI
- CCI-001531
- Version
- SRG-MPOL-086
- Vuln IDs
-
- V-36005
- Rule IDs
-
- SV-47321r1_rule
Checks: C-44242r2_chk
The user agreements must include DAA authorized tasks for the mobile device and relevant security requirements, including, the DoD CIO Memorandum, "Policy on Use of Department of Defense (DoD) Information Systems Standard Consent Banner and User Agreement," 9 May 2008. Inspect a copy of the site's user agreement. Verify the user agreement has the minimum elements required IAW the DoD CIO Memorandum. If the site user agreements do not exist or are not compliant with the minimum requirements, this is a finding.
Fix: F-40532r1_fix
Develop and publish policy mandating all users sign a user agreement before they are issued a mobile or wireless device.