Mobility Policy STIG Version Comparison
Mobile Policy Security Technical Implementation Guide (STIG)
Comparison
There are 3 differences between versions v2 r3 (Oct. 28, 2016) (the "left" version) and v2 r4 (Oct. 26, 2018) (the "right" version).
Check WIR0010-01 was added to the benchmark in the "right" version.
This check's original form is available here.
Text Differences
Title
Personnally owned or contractor owned CMDs must not be used to transmit, receive, store, or process DoD information or connect to DoD networks.
Check Content
Interview the site IAM and IAO and determine if personally owned or contractor owned CMDs (Bring Your Own Device – BYOD) are used at the site to transmit, receive, store, or process DoD information or connect to DoD networks. Mark as a finding if personally owned or contractor owned CMDs (Bring Your Own Device – BYOD) are used to transmit, receive, store, or process DoD information or connect to DoD networks.
Discussion
The use of unauthorized personally-owned CMDs to receive, store, process, or transmit DoD data could expose sensitive DoD data to unauthorized people. The DoD CIO currently prohitibits the use of personally owned or contractor owned CMDs (Bring Your Own Device – BYOD).
Fix
Prohibit use of personally owned or contractor owned CMDs (Bring Your Own Device – BYOD) at the site to transmit, receive, store, or process DoD information or connect to DoD networks.