National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

Good for Enterprise 8.x STIG Version 1, Release 3 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Mobile Device Manager for the Blackberry Enterprise Server cpe:/a:blackberry:mobile_device_manager (View CVEs)

Checklist Highlights

Checklist Name:
Good for Enterprise 8.x STIG
Checklist ID:
791
Version:
Version 1, Release 3
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
08/12/2014

Checklist Summary:

The Good for Enterprise 8.x Security Technical Implementation Guide (STIG) provides security policy and configuration requirements for the use of the Good for Enterprise server and supported devices running iOS in the Department of Defense (DoD). Guidance in these documents applies only to Good for Enterprise with software version 8.x and listed supported devices and platforms and excludes Samsung Knox devices, which will be supported in a later release. Only Apple iOS 7 devices with appropriate STIGs applied are authorized for use with Good for Enterprise 8.x.

Checklist Role:

  • Server

Known Issues:

Not provided.

Target Audience:

Not provided.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DoD Instruction (DoDI) 8500.01 requires that “all IT that receives, processes, stores, displays, or transmits DoD information will be […] configured […] consistent with applicable DoD cybersecurity policies, standards, and architectures” and tasks that Defense Information Systems Agency (DISA) “develops and maintains control correlation identifiers (CCIs), security requirements guides (SRGs), security technical implementation guides (STIGs), and mobile code risk categories and usage guides that implement and are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures, with the support of the NSA/CSS, using input from stakeholders, and using automation whenever possible.” This document is provided under the authority of DoDI 8500.01.

Comments/Warnings/Miscellaneous:

Not provided.

Disclaimer:

Not provided.

Product Support:

Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

Moved to FINAL - 08/29/2017
Sunset By DISA - 10/27/2017
Update Checklist - content updated after sunset
updated URLs - 9/11/19

Dependency/Requirements:

URL Description

References:

Reference URL Description
https://dl.dod.cyber.mil/wp-content/uploads/stigs/pdf/u_good_enterprise_8x_stig_release_memo.pdf Sunset - Good for Enterprise 8.x STIG - Ver 1, Release Memo

NIST checklist record last modified on 09/11/2019