Skip to content

The site Incident Response Plan or other procedure must include procedures to follow when a mobile operating system (OS) based mobile device is reported lost or stolen.

An XCCDF Rule

Description

Sensitive DoD data could be stored in memory on a DoD operated mobile operating system (OS) based mobile device and the data could be compromised if required actions are not followed when a mobile device is lost or stolen. Without procedures for lost or stolen mobile operating system (OS) based mobile devices, it is more likely that an adversary could obtain the device and use it to access DoD networks or otherwise compromise DoD IA.

Property Value
Responsibility System Administrator

ID
SV-30699r7_rule
Version
WIR-SPP-007-01
Severity
Low
Updated

Remediation Templates

A Manual Procedure

Publish procedures to follow if a mobile operating system (OS) based  mobile device is lost or stolen.