Wireless STIG Good Mobile Messaging Wireless Email System Security Checklist Version 6, Release 3 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Prose - Wireless STIG Good Mobile Messaging Wireless Email System Security Checklist
- Defense Information Systems Agency
Target:
| Target | CPE Name |
|---|---|
| Good Domino Mobile Messaging Server 5.0 Server | cpe:/a:gooddomino:mobile_messaging_server:5.0 (View CVEs) |
| Microsoft Windows Mobile 5.0 | cpe:/a:microsoft:windows_mobile:5.0 (View CVEs) |
| Microsoft Windows Mobile 6.0 | cpe:/o:microsoft:windows_mobile:6.0 (View CVEs) |
| Microsoft Windows Mobile 6.1 | cpe:/o:microsoft:windows_mobile:6.1 (View CVEs) |
Checklist Highlights
- Checklist Name:
- Wireless STIG Good Mobile Messaging Wireless Email System Security Checklist
- Checklist ID:
- 251
- Version:
- Version 6, Release 3
- Type:
- Compliance
- Review Status:
- Archived
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 04/23/2010
Checklist Summary:
The Wireless STIG Checklist for Motorola Good Mobile Messaging Wireless Email System provides required installation, configuration, and operating instructions for the Good Mobile Messaging (GMM) wireless email system in the Department of Defense (DoD). Guidance in this document applies to all GMM systems, including Good enabled personal digital assistants (PDAs), smartphones, and Good system servers. This checklist serves as both a security review checklist and a configuration guide. Information Assurance Officers (IAOs), Security Managers (SMs), System Administrators (SAs), device users, and security readiness reviewers will use this document to ensure the security of GMM implementations. This document provides the minimum â??baselineâ?� GMM security guidance for DoD. Combatant Commanders/Services/Agencies (CC/S/A) may direct more secure configuration settings based on operational requirements.
Checklist Role:
- Windows Mobile Messaging Wireless Email
Known Issues:
Not provided.
Target Audience:
Developed by DISA for the DOD. Information Assurance Officers (IAOs), Security Managers (SMs), System Administrators (SAs), device users, and security readiness reviewers Section 2 should be used by IAOs, SMs, and SAs when performing self-assessments. This section is also used by DISA FSO to perform Security Readiness Reviews (SRRs). Appendix E, provides procedures used by SAs and SRR reviewers when registering and updating assets in the Vulnerability Management System (VMS). Section 3 and Appendices B, C, and D are intended primarily for GMM system administrators and provide security related requirements for system installation, setup, and configuration. The configuration settings (or actions) in Appendix B are classified as either â??Requiredâ?� or â??Optional.â?� â??Requiredâ?� configuration settings are mandatory for all installations of GMM in DoD. â??Optionalâ?� settings are the recommended and preferred configurations for GMM. â??Optionalâ?� configuration settings may not be possible at all DoD installations because of operational or network constraints.
Target Operational Environment:
- Managed
Testing Information:
This checklist covers configuration requirements for Good Mobile Messaging version 5.0 servers and Windows Mobile 5.0 â?? 6.1. Earlier versions of these products should not be used because some required security features are not available. Detailed guidance on approved versions is found throughout this document.
Regulatory Compliance:
Not provided.
Comments/Warnings/Miscellaneous:
For our NATO customers using this document: The term â??classifiedâ?� used in this document refers to US Government classifications of Confidential, Secret, and Top Secret. NATO GMM deployments are permitted to carry information bearing a NATO classification of â??NATO restrictedâ?� and should be treated in a similar manner as US Government information marked Unclassified//For Official Use Only. The security guidance provided in this document can be directly applied to NATO wireless email system deployments with the understanding that â??NATO Restrictedâ?� information should not be equated to US Government-defined â??classifiedâ?� information.
Disclaimer:
Not provided.
Product Support:
Not provided.
Point of Contact:
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Dependency/Requirements:
| URL | Description |
|---|
References:
| Reference URL | Description |
|---|
