Good for Enterprise 8.x STIG Version 1, Release 3 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Sunset - Good for Enterprise 8.x STIG - Ver 1, Rel 3
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Mobile Device Manager for the Blackberry Enterprise Server | cpe:/a:blackberry:mobile_device_manager (View CVEs) |
Checklist Highlights
- Checklist Name:
- Good for Enterprise 8.x STIG
- Checklist ID:
- 791
- Version:
- Version 1, Release 3
- Type:
- Compliance
- Review Status:
- Archived
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 08/12/2014
Checklist Summary:
The Good for Enterprise 8.x Security Technical Implementation Guide (STIG) provides security policy and configuration requirements for the use of the Good for Enterprise server and supported devices running iOS in the Department of Defense (DoD). Guidance in these documents applies only to Good for Enterprise with software version 8.x and listed supported devices and platforms and excludes Samsung Knox devices, which will be supported in a later release. Only Apple iOS 7 devices with appropriate STIGs applied are authorized for use with Good for Enterprise 8.x.
Checklist Role:
- Server
Known Issues:
Not provided.
Target Audience:
Not provided.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
DoD Instruction (DoDI) 8500.01 requires that “all IT that receives, processes, stores, displays, or transmits DoD information will be […] configured […] consistent with applicable DoD cybersecurity policies, standards, and architectures” and tasks that Defense Information Systems Agency (DISA) “develops and maintains control correlation identifiers (CCIs), security requirements guides (SRGs), security technical implementation guides (STIGs), and mobile code risk categories and usage guides that implement and are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures, with the support of the NSA/CSS, using input from stakeholders, and using automation whenever possible.” This document is provided under the authority of DoDI 8500.01.
Comments/Warnings/Miscellaneous:
Not provided.
Disclaimer:
Not provided.
Product Support:
Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule
Point of Contact:
disa.stig_spt@mail.mil
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Moved to FINAL - 08/29/2017 Sunset By DISA - 10/27/2017 Update Checklist - content updated after sunset updated URLs - 9/11/19
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|---|
https://dl.dod.cyber.mil/wp-content/uploads/stigs/pdf/u_good_enterprise_8x_stig_release_memo.pdf | Sunset - Good for Enterprise 8.x STIG - Ver 1, Release Memo |