U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Wireless STIG Good Mobile Messaging Wireless Email System Security Checklist Version 6, Release 3 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Good Domino Mobile Messaging Server 5.0 Server cpe:/a:gooddomino:mobile_messaging_server:5.0 (View CVEs)
Microsoft Windows Mobile 5.0 cpe:/a:microsoft:windows_mobile:5.0 (View CVEs)
Microsoft Windows Mobile 6.0 cpe:/o:microsoft:windows_mobile:6.0 (View CVEs)
Microsoft Windows Mobile 6.1 cpe:/o:microsoft:windows_mobile:6.1 (View CVEs)

Checklist Highlights

Checklist Name:
Wireless STIG Good Mobile Messaging Wireless Email System Security Checklist
Checklist ID:
251
Version:
Version 6, Release 3
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
04/23/2010

Checklist Summary:

The Wireless STIG Checklist for Motorola Good Mobile Messaging Wireless Email System provides required installation, configuration, and operating instructions for the Good Mobile Messaging (GMM) wireless email system in the Department of Defense (DoD). Guidance in this document applies to all GMM systems, including Good enabled personal digital assistants (PDAs), smartphones, and Good system servers. This checklist serves as both a security review checklist and a configuration guide. Information Assurance Officers (IAOs), Security Managers (SMs), System Administrators (SAs), device users, and security readiness reviewers will use this document to ensure the security of GMM implementations. This document provides the minimum â??baselineâ?� GMM security guidance for DoD. Combatant Commanders/Services/Agencies (CC/S/A) may direct more secure configuration settings based on operational requirements.

Checklist Role:

  • Windows Mobile Messaging Wireless Email

Known Issues:

Not provided.

Target Audience:

Developed by DISA for the DOD. Information Assurance Officers (IAOs), Security Managers (SMs), System Administrators (SAs), device users, and security readiness reviewers Section 2 should be used by IAOs, SMs, and SAs when performing self-assessments. This section is also used by DISA FSO to perform Security Readiness Reviews (SRRs). Appendix E, provides procedures used by SAs and SRR reviewers when registering and updating assets in the Vulnerability Management System (VMS). Section 3 and Appendices B, C, and D are intended primarily for GMM system administrators and provide security related requirements for system installation, setup, and configuration. The configuration settings (or actions) in Appendix B are classified as either â??Requiredâ?� or â??Optional.â?� â??Requiredâ?� configuration settings are mandatory for all installations of GMM in DoD. â??Optionalâ?� settings are the recommended and preferred configurations for GMM. â??Optionalâ?� configuration settings may not be possible at all DoD installations because of operational or network constraints.

Target Operational Environment:

  • Managed

Testing Information:

This checklist covers configuration requirements for Good Mobile Messaging version 5.0 servers and Windows Mobile 5.0 â?? 6.1. Earlier versions of these products should not be used because some required security features are not available. Detailed guidance on approved versions is found throughout this document.

Regulatory Compliance:

Not provided.

Comments/Warnings/Miscellaneous:

For our NATO customers using this document: The term â??classifiedâ?� used in this document refers to US Government classifications of Confidential, Secret, and Top Secret. NATO GMM deployments are permitted to carry information bearing a NATO classification of â??NATO restrictedâ?� and should be treated in a similar manner as US Government information marked Unclassified//For Official Use Only. The security guidance provided in this document can be directly applied to NATO wireless email system deployments with the understanding that â??NATO Restrictedâ?� information should not be equated to US Government-defined â??classifiedâ?� information.

Disclaimer:

Not provided.

Product Support:

Not provided.

Point of Contact:

[email protected]

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:



					

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 05/01/2019