BlackBerry Playbook Tablet OS 1.x
BlackBerry PlayBook Security Technical Implementation Guide. Version v1 r1, released Jan. 30, 2012.
WIR-MOS-NS-006-01: All non-core applications on mobile devices must be approved by the DAA or Command IT Configuration Control Board.
Detailed Requirements: Core applications are applications included in the mobile operating system by the operating system vendor. A list of core applications is usually in the STIG overview document or the STIG Configuration Tables document. All non-core applications on the mobile device must be approved by the DAA or the Command IT CCB. Approval must be documented in some type of approval (memo, letter, etc.). Non-core applications include applications added to the device by the carrier (AT&T or Verizon Wireless map application). Check Procedures: First, review the procedures the site or command uses to review and approve third-party applications used on site managed mobile devices. Have the IAO or DAA representative provide a copy of the application review. Second, select 2-3 random devices managed by the site to review. -Make a list of non-core applications on each device. Look in the smartphone memory and on the SD card. --Have the user log into the device and show the list of applications installed on the device and the media card (procedure will vary, depending on mobile OS). --Verify the site has written approval to use the app from the DAA or Command IT CCB. -Mark as a finding if any app has not been approved.
Discussion
Non-approved applications can contain malware. Approved applications should be reviewed and tested by the approving authority to ensure they do not contain malware, spyware, or have unexpected features (e.g., send private information to a web site, track user actions, connect to a non-DoD management server). The DAA or Command IT Configuration Control Board (CCB) is responsible for setting up procedures to review, test, and approve smartphone applications. It is expected the process will be similar to what is used to approve and manage applications on command PCs.
Fix
Have DAA or Command IT CCB review and approve all non-core applications on mobile OS devices.
Rating Info
DISA Cat III. NIST impact 2.
Expert Comment
None
WIR-MOS-NS-050-04: Connecting mobile devices to user social media web accounts (Facebook, Twitter, etc.) must be based on the Command’s Mobile Device Personal Use Policy.
Check a sample (2-3) of mobile devices managed at the site and are not authorized to connect to a DoD network or store or process sensitive or classified DoD information. Review the Command’s Mobile Device Personal Use Policy. Determine if the mobile device is being used to connect to user social media web accounts. Look for social media icons on the device and talk to the user. The exact procedure will vary, depending on the mobile OS. If the device is being used to connect to user social media accounts, determine if these applications are authorized by the Command’s Mobile Device Personal Use Policy. Mark as a finding if the device is being used to connect to unauthorized user social media accounts. This check is not applicable if the Command’s Mobile Device Personal Use Policy allows connecting to user social media web accounts.
Discussion
The risk of connecting to user social media web accounts on a non-DoD-network connected mobile device that does not contain sensitive or classified DoD data/information should be evaluated by the DAA against mission need and how the device is intended to be used. There is a risk that connecting to user social media web accounts could introduce malware on the device, which could impact the performance of the device and corrupt non-sensitive data stored on the device.
Fix
Train user to not connect to unauthorized social media web sites unless authorized by the Command’s Mobile Device Personal Use Policy.
Rating Info
DISA Cat III. NIST impact 2.
Expert Comment
None
WIR-MOS-NS-050-01: The installation of user owned applications on the mobile device must be based on the Command’s Mobile Device Personal Use Policy.
Check a sample (2-3) of mobile devices managed at the site authorized to connect to a DoD network or store or process sensitive or classified DoD information. Review the Command’s Mobile Device Personal Use policy. Determine if any personally owned apps are installed on the mobile device, including the SD media card. The exact procedure will vary, depending on the OS. If personally owned apps are found, determine if these apps are authorized by the Command’s Mobile Device Personal Use Policy. Mark as a finding if unauthorized personal apps are found on site managed devices. This check is not applicable if the Command’s Mobile Device Personal Use Policy allows the installation of user owned applications.
Discussion
The risk of installing personally owned or freeware apps on a DoD mobile device should be evaluated by the DAA against mission need and how the device is intended to be used. There is a risk that personally owned or freeware apps could introduce malware on the device, which could impact the performance of the device and corrupt non-sensitive data stored on the device.
Fix
Remove unauthorized applications.
Rating Info
DISA Cat III. NIST impact 2.
Expert Comment
None
WIR-MOS-NS-050-02: The use of the mobile device to view and/or download personal email must be based on the Command’s Mobile Device Personal Use Policy.
Check a sample (2-3) of mobile devices managed at the site authorized to connect to a DoD network or store or process sensitive or classified DoD information. Review the Command’s Mobile Device Personal Use Policy. Determine if devices are being used to view personal email or store personal email messages. The exact procedure will vary, depending on the mobile OS. If personal email is being viewed or downloaded, determine if this use of the device is authorized by the Command’s Mobile Device Personal Use Policy. Mark as a finding if unauthorized personal email is being viewed or downloaded on site managed devices. This check is not applicable if the Command’s Mobile Device Personal Use Policy allows viewing and/or download of personal email.
Discussion
The risk of viewing and downloading personal email on a non-DoD-network connected mobile device that does not contain sensitive or classified DoD data/information should be evaluated by the DAA against mission need and how the device is intended to be used. There is a risk that personal email could introduce malware on the device, which could impact the performance of the device and corrupt non-sensitive data stored on the device.
Fix
Train users to not view or download personal email unless authorized by the Command’s Mobile Device Personal Use Policy.
Rating Info
DISA Cat III. NIST impact 2.
Expert Comment
None
WIR-MOS-NS-016: The smartphone inactivity timeout must be set.
This check applies to any mobile OS device (smartphones, tablets, etc.). Check a sample of 2-3 devices managed by the site to verify a device inactivity timeout has been set to 60 minutes or less (15 minutes is recommended). The exact procedure will vary, depending on the mobile OS. Have the user show that a device inactivity timeout has been set to 60 minutes or less. Mark as a finding if configuration is not set as required.
Discussion
Sensitive DoD data could be compromised if the smartphone does not automatically lock after the required period of inactivity.
Fix
Set the smartphone inactivity timeout to required value.
Rating Info
DISA Cat III. NIST impact 2.
Expert Comment
None
WIR-MOS-NS-050-03: Download of user owned data (music files, picture files, etc.) on mobile devices must be based on the Command’s Mobile Device Personal Use Policy.
Check a sample (2-3) of mobile devices managed at the site authorized to connect to a DoD network or store or process sensitive or classified DoD information. Review the Command’s Mobile Device Personal Use Policy. Determine if any user owned data (music files, picture files, etc.) are installed on the mobile device, including the SD media card. The exact procedure will vary, depending on the mobile OS. If user owned data (music files, picture files, etc.) are found, determine if these apps are authorized by the Command’s Mobile Device Personal Use Policy. Mark as a finding if unauthorized user owned data (music files, picture files, etc.) are found on site managed devices. This check is not applicable if the Command’s Mobile Device Personal Use Policy allows the download of personal data files.
Discussion
The risk of installing user owned data (music files, picture files, etc.) on a non-DoD-network connected mobile device that does not contain sensitive or classified DoD data/information should be evaluated by the DAA against mission need and how the device is intended to be used. There is a risk that user owned data (music files, picture files, etc.) could introduce malware on the device, which could impact the performance of the device and corrupt non-sensitive data stored on the device.
Fix
Do not install personal data files on the mobile device unless authorized by the Command’s Mobile Device Personal Use Policy.
Rating Info
DISA Cat III. NIST impact 2.
Expert Comment
None
WIR1100-01: The installed version of the BlackBerry Playbook tablet operation system must be the latest version of OS 1.x.
Select a sample of site managed Playbook tablets to review (2-3 devices selected at random). Determine the installed OS version number as follows: -Have the user log into the Playbook tablet. -Navigate to the OS version number: Settings > About Mark as a finding if the required OS version is not installed.
Discussion
Required security features are not available in earlier OS versions. In addition, BlackBerry Playbook tablet OS 2.x may not be used until a STIG update has been released covering that version. New STIG checks are required to adequately secure new features expected in the OS 2.x release, otherwise sensitive DoD information may be compromised.
Fix
Install the latest version of BlackBerry Playbook tablet OS 1.x.
Rating Info
DISA Cat II. NIST impact 3.
Expert Comment
None
WIR-MOS-NS-011: The device minimum password/passcode length must be set.
This check applies to any mobile OS device (smartphones, tablets, etc.). Check a sample of 2-3 devices managed by the site to verify the device unlock password/passcode has been set to 8 or more alphanumeric characters. The exact procedure will vary, depending on the mobile OS. Have the user show that a device unlock password/passcode has been set to 8 or more alphanumeric characters. Mark as a finding if configuration is not set as required.
Discussion
Sensitive DoD data could be compromised if a device unlock password/passcode is not set to required length on DoD smartphones.
Fix
Set the smartphone minimum password/passcode length as required.
Rating Info
DISA Cat III. NIST impact 2.
Expert Comment
None
WIR-MOS-NS-010: Smartphones must be configured to require a password/passcode for device unlock.
This check applies to any mobile device (smartphones, tablets, etc.). Check a sample of 2-3 devices managed by the site to verify a device unlock password/passcode has been enabled on the device. The exact procedure will vary, depending on the OS. Have the user show that a device unlock password/passcode has been enabled on the device. Mark as a finding if configuration is not set as required.
Discussion
Sensitive DoD data could be compromised if a device unlock password/passcode is not set up on DoD smartphones.
Fix
Configure the smartphone to require a passcode for device unlock.
Rating Info
DISA Cat III. NIST impact 2.
Expert Comment
None