U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

General Mobile Device (Non-Enterprise Activated) STIG Version 1, Release 4 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Apple iPhone cpe:/h:apple:iphone (View CVEs)
Apple iPhone OS 4.0 cpe:/o:apple:iphone_os:4.0 (View CVEs)
Apple iPhone OS 4.2.10 cpe:/o:apple:iphone_os:4.2.1 (View CVEs)
Apple iPhone OS 4.3.0 cpe:/o:apple:iphone_os:4.3.0 (View CVEs)
Apple iPhone OS 4.3.5 cpe:/o:apple:iphone_os:4.3.5 (View CVEs)
Blackberry cpe:/h:rim:blackberry (View CVEs)
Google Android 2.2 cpe:/o:google:android:2.2 (View CVEs)
Google Android 2.3 cpe:/o:google:android:2.3 (View CVEs)

Checklist Highlights

Checklist Name:
General Mobile Device (Non-Enterprise Activated) STIG
Checklist ID:
417
Version:
Version 1, Release 4
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
02/26/2012

Checklist Summary:

The General Mobile Device (Non-Enterprise Activated) Security Technical Implementation Guide (STIG) provides security policy and configuration requirements for the use of any DoD mobile handheld device that is not connected at any time to a DoD network or enterprise or processes sensitive or classified DoD data or voice communications. Sensitive data or information is defined as any DoD data or information that has not been deemed as publicly releasable by a DoD Public Affairs Officer (PAO). Section 2.1 provides additional information on acceptable use conditions for this type of device.

Checklist Role:

  • Desktop or Mobile Client

Known Issues:

Not provided.

Target Audience:

This document is a requirement for all DoD-administered systems and all systems connected to DoD networks or operated in a DoD environment. These requirements are designed to assist SMs, Information Assurance Managers (IAMs), IAOs, and SAs with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts.

Target Operational Environment:

  • Managed

Testing Information:

Not provided.

Regulatory Compliance:

DoDI 8100.04 & DoDD 8500.1

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via email to the following address: fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Disclaimer:

Not provided.

Product Support:

Comments or proposed revisions to this document should be sent via email to the following address: fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Point of Contact:

Comments or proposed revisions to this document should be sent via email to the following address: fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Sponsor:

Department of Defense (DoD)

Licensing:

Not provided.

Change History:

Version 1, Release 4 - 25 July 2013
Version 1, Release 3 - 26 April 2013
Version 1, Release 2 - 27 April 2012
Version 1, Release 1 - 26 February 2012

Dependency/Requirements:

URL Description
http://iase.disa.mil/stigs/Documents/u_general_mobile_device_nea_%20stig_ver1_release_memo.pdf General Mobile Device (Non-Enterprise Activated) STIG Release Memo

References:

Reference URL Description

NIST checklist record last modified on 05/01/2019