STIGQter STIGQter: STIG Summary: Mobile Device Policy Security Technical Implementation Guide (STIG) Version: 2 Release: 6 Benchmark Date: 26 Jul 2019:

Required actions must be followed at the site when a mobile device has been lost or stolen.

DISA Rule

SV-30706r6_rule

Vulnerability Number

V-24969

Group Title

Follow lost/stolen mobile device procedures

Rule Version

WIR-SPP-007-02

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Follow required actions when a mobile device is reported lost or stolen.

Check Contents

Interview the ISSO. Determine if any site mobile devices were reported lost or stolen within the previous 24 months. If yes, review written records, incident reports, and/or after action reports and determine if required procedures were followed.

If the site had a lost or stolen mobile device within the previous 24 months and required procedures were not followed, this is a finding.

Vulnerability Number

V-24969

Documentable

False

Rule Version

WIR-SPP-007-02

Severity Override Guidance

Interview the ISSO. Determine if any site mobile devices were reported lost or stolen within the previous 24 months. If yes, review written records, incident reports, and/or after action reports and determine if required procedures were followed.

If the site had a lost or stolen mobile device within the previous 24 months and required procedures were not followed, this is a finding.

Check Content Reference

M

Responsibility

System Administrator

Target Key

3521

Comments