From Mobile Policy Security Requirements Guide
Part of SRG-MPOL-076
Associated with: CCI-000103
Some CMDs are not authorized to connect to DoD email systems because they do not have required security controls. There is a high risk of introducing malware on a DoD email system or of compromising sensitive DoD data if these types of devices are connected to a DoD email system. There is a high risk sensitive data will be exposed to unauthorized personnel with access to the device if DoD email was viewed, processed, or stored on the device.
CMDs classified as non-enterprise activated are not authorized to access DoD networks or store or process sensitive DoD information. Interview the security personnel and 2-3 users who are using mobile OS devices that are managed by the site, and which are not authorized to connect to DoD email systems. Verify written policy and training material exists (or requirement is listed on a signed user agreement) stating mobile devices must not be used to connect to a DoD email system. If written policy and training material does not exist or users are not aware of the requirement, this is a finding.
Develop a written policy and training material that states CMDs classified as non-enterprise activated must not access DoD email systems.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer