Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Review the organization's access control policy and security procedures for mobile devices to determine if the organization has properly and clearly defined the maximum number of consecutive unsuccessful login attempts to the mobile device. If the security procedures or access control policy does not define the maximum number of consecutive unsuccessful login attempts, this is a finding.
Clearly define the maximum number of consecutive unsuccessful login attempts to the mobile device in its access control policy and/or security procedures.
Review the organization's policies related to network protocols. The organization must document those networking protocols within the information system deemed to be non-secure for remote access into DoD networks. If the policies do not specifically list non-secure protocols, this is a finding.
Create and document a list of networking protocols within the information system deemed to be non-secure for remote access into DoD networks.
Review the organization's CMD policy to determine if it states that a risk-based determination for applications is performed before they are accredited by the DAA prior to distribution or installation on a CMD. If the organization's CMD policy does not provide for a risk-based determination and approval, prior to installation on a CMD, this is a finding.
Include a risk-based determination and DAA accreditation for applications prior to installation on a CMD in the CMD policy.
Review the accreditation documentation to determine if the WMAN system is a tactical system or a commercial system used in a tactical environment. If the WMAN system is not a tactical system or a commercial system operated in a tactical environment, this requirement is NA. Verify a TRANSEC vulnerability analysis was performed on the WMAN system during the system C&A review. The documentation must include the required components. Verification that radio communications are encrypted, including the management, control and data frames, determination of denial of service risks to the network, and probability of LPE for the WMAN signal. If documentation is missing the required analysis and components, this is a finding. Note: Check with NSA to determine if additional mitigation actions are available.
Include a TRANSEC vulnerability analysis in the WMAN system accreditation if the WMAN system operates in a tactical environment.
Review the site's network monitoring and scanning procedures. Determine if monitoring of the WIDS is being conducted at an organized defined time period. If WIDS monitoring is not being performed at an organization defined time period, this is a finding.
Monitor for unauthorized wireless connections to the information system at an organization defined time period.
Review the organization's access control and security policy, procedures addressing wireless implementation and usage (including restrictions), wireless scanning reports, and any other relevant documentation. The objective is to verify the organization has: (i) established a requirement for monitoring the wireless connection environment for unauthorized access, (ii) established a requirement of periodic scans to be conducted for unauthorized wireless access points, and (iii) established a time period at which these activities are to be conducted. If the organization has not defined the time period for monitoring or scanning, this is a finding.
Define the time period for monitoring of unauthorized wireless connections to information systems to include the time period for performing scans to identify unauthorized wireless access points.
Review the organization's access control and security policy, along with any other relevant documentation, to verify the organization documents and takes the appropriate actions when unauthorized wireless connections are discovered. If the organization does not follow the defined procedures, this is a finding.
Update documented procedures to document and take appropriate action if an unauthorized wireless connection is discovered.
Review the organization's access control and security policy, along with any other relevant documentation, to verify the organization has defined actions to be taken when unauthorized wireless connections are discovered. If the organization has not defined the appropriate actions, this is a finding.
Define and document the appropriate action(s) to be taken when unauthorized wireless connections are discovered.
Review the organization's access control policy, security procedures addressing wireless usage restrictions, and other relevant documents. The objective is to ensure the organization has defined usage restrictions for all wireless access. If the organization has not established usage restrictions, this is a finding.
Establish a usage restrictions policy for wireless access within the organization's boundaries/enclave/area of responsibility.
Review the organization's access control and procedures addressing wireless implementation and usage (including restrictions), security policy, information system configuration settings, restrictions and any other associated documentation, and other relevant documents or records. Ensure the organization has defined and established organization-controlled boundaries for the implementation of Wi-Fi and Bluetooth communications. If wireless boundaries are not defined and controlled, this is a finding.
Define and establish organization controlled boundaries for the implementation of the Wi-Fi and Bluetooth communications.
Review the CONOPS or site security plan on the use of Bluetooth devices and determine what class of radio is allowed for use. If Class 1 radios are allowed for use in Bluetooth devices, this is a finding.
Update policy to include Bluetooth devices must use only Class 2 or 3 standard radios.
Review the CONOPS or site security plan on the use of Bluetooth devices and determine if the radio is in conformance with the specifications. If wireless equipment or systems are activated inside the United States and Possessions, then this requirement is NA. If any modifications (signal amplification, antenna modification, etc.) have been made, this is a finding.
Update CONOPS or site security plan to include Bluetooth radios must not be modified through signal amplification, antenna configuration, or other techniques that could affect signal detection or interception.
Verify the existence of approval documentation signed by USFORSCOM or host nation representatives. In accordance with DoD policy, users of non-licensed devices that are intended for use outside of the US&P must submit appropriate forms (DD 1494) for host nation coordination/approval. This is not necessary when it is well known that the host nation makes wide use of the same WLAN protocols as the DoD (i.e., Wi-Fi specifications 802.11b, 802.11g, or 802.11n). However, this should be verified. Most noteworthy is that WLAN equipment in Japan uses 802.11j which operates in the 4.9 to 5.0 GHz band. WLAN equipment based on other standards interferes with such equipment in Japan. If approval documentation does not exist or is not available for verification, this is a finding.
Receive approval documentation signed by USFORSCOM or host nation representatives prior to activating wireless equipment or systems outside the US&P.
Review the organization's policy to ensure wireless NICs are required to be removed prior to use in a classified environment. Verify the site has procedures in place to ensure laptops with wireless NICs are not used for classified data processing. Inquire about laptops/PCs used to process classified information that have embedded wireless NICs. No embedded wireless NICs are allowed, including WLAN, Bluetooth, WMAN, cellular, etc. Ensure the NIC is physically removed. Using methods such as tape or software disabling are not acceptable. Determine if the site either purchased laptops without wireless NICs (Wi-Fi, Bluetooth, WiMax, etc.) or physically removed the NICs from laptops. If the site is using embedded wireless NICs in a classified environment, this is a finding. Recommend to the DAA this is a critical finding requiring immediate action. Note: Does not apply to Communication Systems for Classified (CSfC) Wi-Fi systems.
Remove computers with embedded wireless interfaces that cannot be removed from all classified use; these computers must not transfer, receive, store, or process classified information.
Review the organization's access control policy, security procedures addressing wireless implementation, and other relevant documents to ensure the organization has established clear guidance for the implementation of wireless access. If the site does not have clear guidance established for implementation, this is a finding.
Establish clear guidance for the implementation of wireless access within the organization's boundaries/enclave/area of responsibility.
Review the organization's documentation of the wireless system connected to a DoD network to verify DAA approval either by: a.) The accreditation documentation, which must show the wireless system as part of the network diagram or list the system/equipment as being part of the network. b.) DAA approval letter or other document, which must list the system or equipment and date its use is approved. The DAA approval letter or site security plan may be a general statement of approval rather than list each device; however, it does not need to be documented separately from other DAA approval documents for the site network, as long as the approval documents list the wireless system. Verify DAA approval for the type of device used, such as wireless connection services, peripherals, and applications. If wireless systems (including associated peripheral devices, operating system, applications, network/PC connection methods and services) exist and are not approved by the approval authority prior to installation and use for processing DoD information, this is a finding.
Obtain DAA approval, documented by memo or site security plan, prior to wireless systems connected to a DoD network being installed or utilized.
Review the site wireless security policy or wireless remote access policy. Verify it contains information on locations where CMD Wi-Fi access is approved or disapproved. The following locations will be specifically listed in the policy: - DoD/Government site-managed Wi-Fi access point connected to the NIPRNet (Enclave-NIPRNet Connected). - DoD/Government site-managed Wi-Fi access point connected to the Internet only (Internet Gateway Only Connection). - Public Wi-Fi Hotspot. - Hotel Wi-Fi Hotspot. - Home Wi-Fi network (user-managed). DoD CMD will not be used to connect to Public or Hotel Hotspots. If the site policy does not contain the required information on required CMD Wi-Fi security controls, this is a finding. Note: Applies to any Wi-Fi System.
Update the CMD Wi-Fi security policy to include information on locations CMD Wi-Fi access is approved or disapproved.
This check only applies to sites using Bluetooth or ZigBee radios. Verify a written policy or training materials exists stating that Bluetooth (or ZigBee) will be disabled on all applicable devices unless they employ FIPS 140-2 validated cryptographic modules for data in transit. If a policy does not exist or if it does not adequately cover the requirement, this is a finding.
Update the policy or training materials to prohibit use of Bluetooth data transmission without FIPS 140-2 validated cryptographic modules.
Verify the SWLAN system CCAO approval documentation exists, has been approved, and has a SIPRNet Interim Approval to Operate (IATO) or Approval to Operate (ATO) in the GIAP database. Verify the SWLAN system is included in the accreditation documentation and is signed by the DAA. If the SIPRNet connection approval package is not on file with the CCAO, this is a finding.
Disable or remove the non-compliant SWLAN until the site has all required approvals for operation.
Review the site accreditation documentation. Verify that during system design or accreditation process an appropriate WMAN coverage area was determined. Compare the actual radio coverage of the WMAN system with the intended coverage area map. If the actual radio coverage is 10% more than the intended coverage area map, this is a finding.
Update coverage map documentation, reconfigure radio power output settings to the previously approved level, or conduct a new risk assessment based on the new coverage area.
Review the WMAN system data specification sheet (for both access points and bridges). Verify the WMAN system does not operate in the 3.30-3.65 frequency band. If the WMAN system does operate in the 3.30 - 3.65 frequency band, this is a finding.
Update the WMAN system to not operate in the 3.30-3.65 GHz frequency band.
Review the site Incident Response Plan (IRP) or Standard Operating Procedure (SOP) to determine if it includes procedures for reporting unauthorized access, intrusion, jamming, or electromagnetic interference identified during active electromagnetic scanning for wireless systems that connect directly to DoD networks. If the IRP or SOP does not address these requirements, this is a finding.
Update the IRP and/or SOP to have the required procedures for reporting the results of WMAN intrusion scans.
Review the WLAN system product documentation (specification sheet, administration manual, etc.). Verify the system is WPA2-Enterprise certified. If the system is not WPA2-Enterprise certified, this is a finding. Note that WPA is the precursor certification to WPA2 and is not sufficient.
Update all WLAN equipment and software to WPA2-Enterprise certified for wireless systems that connect directly to DoD networks.
Review the organization's access control and security policy, procedures addressing wireless implementation, information system configuration settings, restrictions, and any other associated documentation. The objective is to ensure the organization's wireless security policy requires all wireless systems be authorized prior to connection. If wireless access is not authorized prior to connection, this is a finding.
Establish a wireless access control and security policy to define the administrative procedures and technical requirements to be met prior to being authorized to connect to an organization's information system(s).
Review the site's wireless equipment list and verify all minimum data elements listed below are included in the equipment list. This check applies to any wireless end user device (e.g., CMD, Wi-Fi network interface card) and wireless network devices (e.g., access point, authentication server). The list of approved wireless devices will be stored in a secure location and will include the following at a minimum: For CMDs: - Manufacturer, model number, and serial number of wireless equipment. - Equipment location or who the device was issued to. - Assigned users with telephone numbers and email addresses. Verify all wireless devices used at the site, including infrared mice/keyboards, are included: - Access point Media Access Control (MAC) address (WLAN only). - Access point IP address (WLAN only). - Wireless client MAC address. - Network DHCP range (WLAN & WWAN only). - Type of encryption enabled. - Access point SSID (WLAN only). - Manufacturer, model number, and serial number of wireless equipment. - Equipment location - Assigned users with telephone numbers. Verify procedures are in place for ensuring the list is kept up to date. If the equipment list does not exist, all data elements are not tracked, or the list is outdated, this is a finding.
Maintain a list of all DAA-approved WLAN devices under the organization's control. The list must be updated as devices are commissioned, and contain the data elements required.
Review the site security plan. Wireless network devices, such as access points, laptops, CMDs, and wireless peripherals (keyboards, pointers, etc.) using a wireless network protocol, such as Bluetooth, Wi-Fi, or proprietary protocols must be documented in the site security plan. A general statement in the site security plan permitting the various types of wireless network devices used by the site is acceptable rather than a by-model listing, for example, "wireless devices of various models are permitted as long as they are configured in accordance with the Wireless STIG". If a DAA-approved site security plan does not exist or if it has not been updated, this is a finding.
Update the site security plan to include all devices connecting directly or indirectly (data synchronization) to the network.
Interview the site wireless device administrator and determine if the site has a wireless remote access policy (or a wireless section in a general remote access policy). Verify the policy has been signed by the site DAA, Commander, Director, or other appropriate manager(s). If a wireless remote access policy does not exist or is not signed, this is a finding.
Develop a Wireless Remote Access Policy and have it signed by the site DAA, Commander, Director, or other appropriate authority.
Review local documentation to verify the local CTTA has been notified of the site's intent to install and operate a SWLAN. If the local CTTA has not been notified, this is a finding.
Confirm and document the local CTTA has been notified of the site's intent to install and operate a SWLAN.
Review the site's network access policy and associated documentation and determine if the implemented solution supports all wireless clients and devices. If the network access control solution does not support wireless clients, this is a finding.
Update the network access control solution to support all wireless clients and devices.
Verify written policy and training material exists (or requirement is listed on a signed user agreement) stating CMDs must not be used to transmit classified information. If written policy or training material, stating CMDs must not be used to receive, transmit, or process classified information, does not exist, this is a finding.
Develop and publish policy preventing CMDs from processing, sending, receiving, or storing classified data.
Review documentation and verify the following. Ask for documentation showing the CTTA was consulted about operation and placement of wireless devices. Acceptable proof would be the signature or initials of the CTTA on the architecture diagram or other evidence of coordination. In accordance with DoD policy, the CTTA must have a written separation policy for each classified area; review written policies, training material, or user agreements to see if wireless usage in these areas is addressed; and verify proper procedures for wireless device use in classified areas is addressed in training programs. If any of the following are identified, this is a finding: - CTTA has not designated a separation distance in writing. - DAA has not coordinated with the CTTA. - Users are not trained or made aware (using signage or user agreement) of procedures for wireless device usage in and around classified processing areas. - Site does not have a written procedure prohibiting the use of wireless devices in areas where classified data processing occurs.
Do not permit operation of wireless devices in areas where classified information is electronically stored, processed, or transmitted unless operation is in accordance with DAA-approved CTTA restrictions at the site.
Verify compliance by reviewing the user agreement or security briefing to ensure personnel have been properly instructed on the policy that states that wireless PAN devices cannot be used for, or around classified processing. If the user agreement or security briefing does not exist, this is a finding. Note: The check applies to Wireless USB (WUSB) devices; however, it does not apply to wireless email devices (BlackBerry, Windows Mobile, etc.). Review the appropriate wireless email device security requirements for Bluetooth on these devices.
Develop and publish a policy forbidding the use of wireless PAN devices for classified processing.
CMDs and tablets classified as non-enterprise activated are not authorized to connect to DoD networks. Examples of unauthorized DoD network connections include: -Connecting the mobile device to a DoD network interface device (switch, router, Wi-Fi access point, etc.). Allowed exception: the device can be connected to a DoD managed Internet-Gateway-only connected Wi-Fi access point (AP) (see the Wireless STIG for more information). -Connecting the mobile device to a DoD PC that is authorized to connect to a DoD network. - Managing the mobile device from a DoD network connected Mobile Device Management (MDM) server. -Connecting the mobile device to a web server located on a DoD network, unless the server is available to the general public. -Connecting the mobile device to a DoD email system. Interview the appropriate security personnel and 2-3 users who are using mobile OS devices that are managed by the site, and which are not authorized to connect to DoD networks. Verify written policy and training material exists (or requirement is listed on a signed user agreement) stating mobile OS devices must not be connected to a DoD network, unless authorized to do so. Verify users are aware of the requirement. If written policy or training material does not exist or users are not aware of the requirement, this is a finding.
Develop and publish the policy or procedure preventing connection of CMDs and tablets classified as non-enterprise activated to DoD networks and users are trained on the requirement.
Review the organization's policy on non-enterprise activated CMD processing and storage requirements. The policy should include language that disallows the use of such devices in processing or storing anything other than non-sensitive DoD information. The devices will not be used to connect to DoD email systems, including Outlook Web Access (OWA), or store or process DoD email. If the policy does not disallow the use of CMDs for processing anything other than non-sensitive information, including DoD email, this is a finding.
Develop and publish the policy or procedure preventing the processing or storing of DoD sensitive information, including DoD email, by non-enterprise activated CMDs.
Review the organization's access control and security policy, documentation for random inspections of mobile devices, and other relevant documents or records. Organizational personnel responsible for randomly reviewing/inspecting mobile devices and the information stored on those devices; and organizational personnel using mobile devices in facilities containing information systems processing, storing, or transmitting classified information, will be interviewed. Ensure the organization has established a requirement for mobile devices to be randomly reviewed/inspected to ensure compliance with the organization's access control policy regarding the use of mobile devices within its facilities. If a policy or procedure is not in place for random reviews or inspections, this is a finding.
Develop and publish a requirement for mobile devices to be randomly reviewed/inspected for compliance with the organization's access control policy regarding the use of mobile devices within its facilities containing information systems processing, storing, or transmitting classified information, and the information stored on those devices.
Review the organization's access control and security policy and documentation for manual inspections of non-enterprise activated mobile devices. Organizational personnel responsible for reviewing/inspecting non-enterprise activated CMDs and organizational personnel using the CMDs, will be interviewed. Ensure the organization has established a requirement for CMDs to be manually reviewed/inspected to ensure compliance with the organization's access control policy regarding the use of mobile devices within its facilities, to include determination if unauthorized software is, or has been, running on the device or if the device OS has been modified (e.g., rooted or jailbroken). If a policy or procedure is not in place for manual reviews or inspections, this is a finding.
Manually audit non-enterprise activated CMDs, in person, to determine if unauthorized software is, or has been, running on the device, or if the device OS has been modified (e.g., rooted or jailbroken), when centralized over-the-air auditing is unavailable.
Verify the security personnel of the site where the MDM server is located, is tracking whether local/remote sites (where CMDs are provisioned, issued, and managed) are conducting annual self assessments. Command-level action should be considered for local sites not complying with security requirements for the provisioning, issuance, and managements of CMDs. If required annual self assessments have not been completed by the site, this is a finding.
Conduct annual self assessments where CMDs are provisioned, issued, and managed.
Verify the security personnel or system administrator is maintaining an integrity baseline scan of the mobile device operating system and applications. If an integrity baseline is not maintained, this is a finding.
Maintain an integrity system baseline of the mobile device.
Verify the security personnel or system administrator is saving records of scan results and mitigation actions for the length of time designated by the site security manager (which must be a minimum of 6 months, one year recommended). If results of scans are not maintained by the site for 6 months, this is a finding.
Maintain the results and mitigation actions from integrity tool validation scans on CMDs, for at least 6 months.
Verify the organization has saved its scan results for at least 6 months (one year recommended), viewing one of the older logs to validate the practice. If the organization is not saving the wireless IDS scan results, or is saving them for less than 6 months, this is a finding.
Maintain the results of wireless IDS sensor scan results for at least 6 months.
Verify a procedure is in place to have mobile OS device integrity tool scans reviewed daily by the system administrator or security personnel, or continuously by a server. If tool scans are not reviewed daily, or continuously by a server, this is a finding.
Review MDM integrity tool scans daily by the system administrator or security personnel, or continuously by a server.
Review the organization's access control and security policy, incident handling procedures, and any other relevant documents. Ensure the organization has defined an incident handling policy with specific actions to be implemented when classified information has been found on mobile devices. Determine if the site has had a data spill within the previous 24 months. If yes, review written records, incident reports, and/or after action reports and determine if required procedures were followed. If the incident handling policy is not being followed, this is a finding.
Follow all incident handling policy actions to be taken when classified information has been identified on mobile devices.
Verify classified incident handling, response, and reporting procedures are documented in CMD procedures or security policies. If classified incident handling, response, and reporting procedures are not documented in site procedures or security policies, this is a finding. This requirement applies at both sites where CMDs are issued and managed and at sites where the CMD management server is located. At the CMD management server site, verify Incident Handling and Response procedures include actions to sanitize the CMD management server and email servers (e.g., Exchange, Oracle mail). At CMD sites, verify Incident Handling and Response procedures include actions for incident reporting and actions to safeguard classified CMD devices. The following actions will be followed for all CMD involved in a data spill: -BlackBerry CMDs: follow procedures in the DoD Data Spill Procedures Guide for BlackBerry CMDs located at http://iase.disa.mil/stigs/net_perimeter/wireless/CMD.html. -Windows Mobile, Android, and iOS CMDs: the CMD will be destroyed.
Create and publish an SOP for CMI on CMDs.
Review the organization's policy to determine if it provides information on allowed personal use of site/Command mobile devices. The policy will be approved by the DAA based on a risk-based assessment. The policy must include: -Installation of user-owned and free commercial applications. -Download of user-owned data (music files, picture files, etc.). -Connections to user social media accounts. -The use of geo-location aware applications that save or transmit the location of the device. The use of geo-location aware applications should be based on an Operational Security (OPSEC) risk assessment. -Connecting DoD managed mobile devices to personally-owned computers. (For example, a personally owned computer used to download personally-owned files to the mobile device). If the organization does not have a Mobile Device Personal Use Policy detailing the requirements for downloading user owned data (music files, pictures, etc.) on the mobile device, this is a finding.
Develop a Personal Use Policy which details the requirements for downloading user owned data (music files, picture files, etc.) on the mobile device.
Review the organization's policy to determine if it provides information on allowed personal use of DoD component mobile devices in respect to viewing or downloading personal email. The policy will be approved by the DAA based on a risk based assessment. If the organization does not have a policy on allowed personal use covering viewing or downloading personal email, this is a finding.
Develop a Mobile Device Personal Use Policy which details the requirements for the operating system device to view or download personal email.
Determine if the site has a Personal Use Policy for site/Command-managed or owned CMDs. The policy must include: -Installation of user-owned and free commercial applications. -Viewing and/or downloading personal email. -Download of user-owned data (music files, picture files, etc.). -Connections to user social media accounts. -The use of geo-location aware applications that save or transmit the location of the device. The use of geo-location aware applications should be based on an Operational Security (OPSEC) risk assessment. -Connecting DoD managed mobile devices to personally-owned computers. (For example, a personally owned computer used to download personally-owned files to the mobile device.) Verify the policy has been signed or otherwise approved by the site DAA. If a Personal Use Policy for site/Command managed or owned CMDs does not exist or is not approved by the DAA, this is a finding.
Create and publish a Personal Use Policy for DoD component managed or owned CMDs and obtain DAA approval of the policy.
Review the organization's published implementation guidance on the use of non-enterprise activated CMDs to determine if DoD software certificates are prohibited from being utilized on the devices. If DoD software certificates are not prohibited, this is a finding.
Publish the organization’s implementation guidance prohibiting the use of DoD-issued software certificates on non-enterprise activated CMDs.
Review site's physical security policy. Verify the site addresses CMDs with embedded cameras. If there is no written physical security policy outlining whether CMDs with cameras are permitted or prohibited on or in the DoD facility, this is a finding.
Update the security documentation to include a statement of whether CMDs with cameras (still and video) are allowed in the facility.
Review the organization's policy and procedures for provisioning mobile operating systems and applications. Determine if there are requirements to ensure integrity mechanisms protecting the confidentiality of OTA provisioning. Appropriate integrity mechanisms generally involve the use of FIPS-validated cryptographic modules implementing algorithms that provide integrity services. If there are no requirements in the policies or procedural documentation for these mechanisms, this is a finding.
Establish standard operating procedures for provisioning mobile devices to include integrity mechanisms protecting the confidentiality of OTA provisioning.
Review the policy to ensure a procedure is in place for a CMD system administrator to perform a Wipe command on all new or reissued CMDs (e.g., reset to factory configuration), reload system software or updates, and load a DoD compliant security policy on the CMD before issuing it to DoD personnel and placing the device on a DoD network. Verify required procedures are followed. If required procedures are not followed, this is a finding.
Develop a policy which ensures CMD system administrators perform a wipe command on all new or reissued CMDs and an approved IT policy is pushed to the device before issuing it to DoD personnel.
Review the site's procedure/policy on software updates for CMDs and ensure it includes a requirement for updates to be obtained from a DoD approved source. Verify the site CMD handheld administrator and the CMD management server administrator are aware of the requirement. Determine what procedures are used at the site for installing software updates on site-managed CMDs. If the site does not have procedures in place for users to down-load software updates from only a DoD approved source, this is a finding.
Develop policy requiring CMD software updates originate from DoD approved sources.
Verify the DAA has approved the use of software certificates only until approved CAC readers are available and can be purchased and fielded by the site. Software certificates are only permissible when smart card readers are unavailable and only permissible until they are available. If user software certificates are used on site managed CMDs instead of the CAC, verify the DAA has approved their use (in a letter, memo, site security plan, etc.) and that a DoD approved CAC reader is not available for the CMD. If the site uses software certificates on site managed CMDs and the DAA has not approved their use, this is a finding.
Obtain DAA approval for the use of software certificates or purchase approved CAC readers for enterprise-activated CMDs.
Determine if a policy is in place to ensure only DoD managed IM servers are used for the IM service on site-managed CMDs. If a policy is not in place to ensure the IM server the CMD IM applications connect to is not managed by a DoD site, this is a finding.
Develop policy to require Instant Messaging (IM) client applications connect only to a security-compliant, DoD-controlled IM server.
Review the policy to determine if all non-core mobile OS applications are required to have DAA or Command IT Configuration Control Board approval prior to installation. If DAA or Command IT CCB approval is not required or, if required, not obtained prior to installation on a CMD, this is a finding.
Obtain DAA or Command IT CCB approval prior to installing non-core applications on CMDs.
Determine if any non-core mobile OS applications have been approved by the DAA. If no non-core mobile OS applications have been approved by the DAA, this check is not applicable. Ask the site for documentation showing what security risk analysis procedures are used by the DAA prior to approving non-core applications for use. Determine if the security risk analysis includes the following: -What OS level permissions are required by the application? -The application does not contain malware. -The application does not share data stored on the CMDs with non-DoD servers. -If the application stores sensitive data, the application data storage container is FIPS 140-2 validated. If the application security risk review procedures do not contain the required risk assessment evaluation tasks, this is a finding.
Perform a security risk analysis on a mobile operating system (OS) application prior to the application being approved for use.
Review the organization’s patch procedure and policy to determine if mobile operating systems, mobile applications, and mobile device management agents on managed mobile devices are updated within an organization defined period after the updates/patches are available. If the organization is not updating or patching within the organization defined period of time, this is a finding.
Develop procedures to update mobile operating systems, mobile applications, and mobile device management agents on managed mobile devices within the organization defined period after the updates or patches are available.
Review the organization's access control and security policy and procedures addressing access control and authorization process for portable and mobile devices. Ensure the organization has developed and published an authorization process to be performed on each mobile device before the device can connect to the organization's information system(s). This authorization process will ensure the mobile device complies with all organization-published usage restrictions and implementation guidance. If an authorization process has not been developed and published, this is a finding.
Develop and publish an authorization process to be performed on each mobile device before the device can connect to the organization's information system(s).
Review the organization's security policy and procedures to ensure the organization has developed and documented a list of high risk locations, and has published this list to its security staff and other organizational personnel. Also examine the date of last update to ensure the list is periodically reviewed and updated. Interview organization security staff to determine if a high risk location list exists and if it is periodically reviewed and updated. If the organization has not developed and disseminated a list of high risk locations, this is a finding.
Develop and document a list of high risk locations, and publish this list to security staff and other organizational personnel.
Interview organization personnel to ensure high risk mobile device inspection and preventive measures are understood, executed, and an audit trail is maintained to document actions taken for each high risk mobile device. NOTE: Inspections should be completed before returning devices are connected to a DoD network. If inspection and preventative measures are not employed for devices returning from high risk locations, this is a finding.
Document the inspection and preventive measures applied to each mobile device returning from a high risk location, ensuring organization defined inspection and preventative measures are being applied.
CMDs classified as non-enterprise activated are not authorized to send, receive, store, or process sensitive DoD information or connect to DoD networks. Interview the security personnel and 2-3 users who are using mobile devices that are managed by the site, and which are not authorized to connect to DoD networks. Verify written policy and training material exists (or requirement is listed on a signed user agreement) stating mobile devices must not be used to send, receive, store, or process sensitive or classified DoD data/information or connect to DoD networks. If written policy or training material does not exist or users are not aware of the requirement, this is a finding.
Develop a written policy and training material that states CMDs classified as non-enterprise activated must not be used to send, receive, store, or process sensitive/FOUO or classified data and information or connect to DoD networks.
CMDs classified as non-enterprise activated are not authorized to access DoD networks or store or process sensitive DoD information. Interview the security personnel and 2-3 users who are using mobile OS devices that are managed by the site, and which are not authorized to connect to DoD email systems. Verify written policy and training material exists (or requirement is listed on a signed user agreement) stating mobile devices must not be used to connect to a DoD email system. If written policy and training material does not exist or users are not aware of the requirement, this is a finding.
Develop a written policy and training material that states CMDs classified as non-enterprise activated must not access DoD email systems.
This requirement applies to all CMDs. All CMD users must receive required training on the following topics before they are provided a mobile device or allowed access to DoD networks with a mobile device. Training is divided into two groups: Group A (general topics) and Group B (device specific topics). DISA’s CMD security course satisfies the requirement for Group A training topics. The course is located at: http://iase.disa.mil/eta/CMD_tablet_v1/launchpage.htm. Group A – General Topics a. Requirement that personally-owned PEDs are not used to transmit, receive, store, or process DoD information unless approved by the DAA and the owner signs forfeiture agreement in case of a security incident. b. Procedures for wireless device usage in and around classified processing areas. c. Requirement that PEDs with digital cameras (still and video) are not allowed in any SCIF or other areas where classified documents or information is stored, transmitted, or processed. d. Procedures for a data spill. e. Requirement that wireless email devices and systems are not used to send, receive, store, or process classified messages (does not apply to the SME PED). f. Requirement that CMDs and systems will not be connected to classified DoD networks or information systems. g. Requirement that a user immediately notify appropriate site contacts (i.e., IAO, CMD management server administrator, supervisor, etc.) when his/her CMD has been lost or stolen. h. Secure Bluetooth Smart Card Reader (SCR) usage: --Secure pairing procedures. --Perform secure pairing immediately after the SCR is reset. --Accept only Bluetooth connection requests from devices they control. --Monitor Bluetooth connection requests and activity in order to detect possible attacks and unauthorized activity. i. Procedures on how to sign and encrypt email. j. If Short Message Service (SMS) and/or Multi-media Messaging Service (MMS) are used, IA awareness training material should include SMS/MMS security issues. k. Requirement that Over-The-Air (OTA) wireless software updates should only come from DoD approved sources. l. When CMD Wi-Fi Service is used, the following training will be completed: --Procedures for setting up a secure Wi-Fi connection and verifying the active connection is to a known access point. --Approved connection options (i.e., enterprise, home, etc.). --Requirements for home Wi-Fi connections. --The Wi-Fi radio will be disabled by the user whenever a Wi-Fi connection is not being used. --The Wi-Fi radio must never be enabled while the CMD is connected to a PC. m. Do not discuss sensitive or classified information on non-secure (devices not FIPS 140-2 certified or NSA Type-1 certified for voice) cellular phones, cordless phones, and two-way radios used for voice communications. n. Do not connect PDAs, CMDs, and tablets to any workstation that stores, processes, or transmits classified data. (Exception: SME PED). o. The installation of user owned applications, including geo-location aware applications, on the mobile device will be based on the Command’s Mobile Device Personal Use Policy. p. The use of the mobile OS device to view and/or download personal email will be based the Command’s Mobile Device Personal Use Policy. q. The download of user owned data (music files, picture files, etc.) on the mobile device will be based the Command’s Mobile Device Personal Use Policy. r. The use of the mobile device to connect to user social media web accounts will be based the Command’s Mobile Device Personal Use Policy. s. When the Bluetooth radio is authorized for use with an approved smartcard reader or handsfree headset, the user will disable the Bluetooth radio whenever a Bluetooth connection is not being used. t. All radios on the mobile device (Wi-Fi, Bluetooth, near-field communications (NFC)) must be turned off when not needed. u. Procedure on how to disable Location Services on the device. Location Services must be disabled for all applications or enabled only for applications approved by the DAA for location based services. Group B – Device Specific Topics Add device specific training requirements based on specific devices used. Check Procedures: - Review site CMD training material to see if it contains the required content. NOTE: Some training content may be listed in the User Agreement signed by the user. - Verify site training records show that CMD users received required training and training occurred before the user was issued a CMD. Check training records for approximately five users, picked at random. Mark as a finding if training material does not contain required content.
Develop and publish policy mandating users complete the required training prior to accessing a DoD network with a CMD.
Verify the MDM server administrator(s) has received annual required training. The site should document when the training was completed. The MDM server administrator must be trained on the following requirements: -Administrative service accounts will not be used to log into the MDM server or any server service. -Activation passwords or PINs will consist of a pseudo-random pattern of at least eight characters consisting of at least two letters and two numbers. A new activation password must be selected each time one is assigned (e.g., the same password cannot be used for all users or for a group of users). - User and group accounts on the CMD management server will always be assigned a STIG-compliant security/IT policy. If the MDM server admin did not receive required training annually, this is a finding.
Develop and publish policy mandating the MDM administrator completes and documents his/her training annually.
Review the site's training policy to determine if users are required to complete OPSEC training for the use of non-enterprise activated CMDs. If non-enterprise activated CMD users are not required to complete OPSEC training, this is a finding.
Develop and publish policy mandating all non-enterprise activated CMD users complete Operational Security (OPSEC) training that provides use guidelines and vulnerability mitigation techniques.
Review site CMD training and verify training records show that users received required training, and that training occurred before the user was issued a CMD. All CMD users must receive required training annually and prior to issuance. If training records do not show users receiving required training prior to issuance and at least annually, this is a finding.
Develop required training for all users to complete annually and prior to being issued CMDs.
Determine if any site mobile devices were reported lost or stolen within the previous 24 months. If yes, review written records, incident reports, and/or after action reports and determine if required procedures were followed. If the site had a lost or stolen mobile device within the previous 24 months and required procedures were not followed, this is a finding.
Follow required actions when a CMD is reported lost or stolen.
Interview the appropriate security personnel and review the site's Incident Response Plan or other policies to determine if the site has a written plan of action and procedures for lost or stolen CMDs. If the site's Incident Response Plan (IRP) does not include a written plan of action following a lost or stolen CMD, this is a finding.
Create and publish SOP to follow in the event a CMD is lost or stolen.
This requirement applies to mobile operating system (OS) CMDs. Prior to disposing of a CMD or if the CMD is transferred to another DoD or government agency, follow the disposal procedures found in the appropriate security implementation guide for the CMD of interest. Verify proper procedures are being followed and the procedures are documented. Check to see how retired, discarded, or transitioned CMDs were disposed of during the previous 6 - 12 months and verify compliance with requirements. If procedures are not documented or if documented, they were not followed, this is a finding.
Prior to disposing of a CMD or transitioning it to another user, either in DoD or another agency, follow required procedures.
Ensure all network devices (e.g., IDS, routers, servers, Remote Access System (RAS), firewalls, WLAN access points, etc.) are located in a secure room with limited access or otherwise secured to prevent tampering or theft. For WLAN Access Points: Determine if the WLAN network component of the WLAN system (e.g., access point or bridge) is installed in an unprotected public area where unauthorized personnel can get access to the device. The physical Security Officer may be able to assist in this determination. If yes, the following requirements apply: Note: Access points installed above ceiling tiles in a controlled access area or installed 30 feet above the ground in a controlled access hanger can be considered to be installed in a protected non-public area. The site physical Security Officer should make a determination if a WLAN device installation location should be considered to be an unprotected public area. Determine if the WLAN device has been validated as meeting FIPS 140-2 Level 2, at a minimum, or physically secured by placing it inside a securely mounted, pick-resistant, and lockable enclosure. If the requirements above are not met, this is a finding.
Place all network devices (i.e., Intrusion Detection System (IDS), routers, Remote Access System (RAS), firewalls, etc.) in a secure room with limited access or otherwise secure to prevent tampering or theft.
Review the physical security controls of the SWLAN access points. - Verify site SWLAN access points are physically secured. - Verify there is some method for alerting site security if the access point has been tampered with. - Determine if site SWLAN access points are in locations that provide limited access to only authorized personnel who are approved to access the access points. - Determine how the site conducts a daily physical inventory of SWLAN access points. Verify that required inventory methods are used, depending on whether the access points are stored in a COMSEC container. If physical security controls are not implemented for SWLAN access points, this is a finding.
Implement required physical security controls for the SWLAN.
The user agreements must include DAA authorized tasks for the mobile device and relevant security requirements, including, the DoD CIO Memorandum, "Policy on Use of Department of Defense (DoD) Information Systems Standard Consent Banner and User Agreement," 9 May 2008. Inspect a copy of the site's user agreement. Verify the user agreement has the minimum elements required IAW the DoD CIO Memorandum. If the site user agreements do not exist or are not compliant with the minimum requirements, this is a finding.
Develop and publish policy mandating all users sign a user agreement before they are issued a mobile or wireless device.