CIS Google Android 4 Benchmark v1.0.0
CIS Google Android 4 Benchmark v1.0.0
v1.0.0
SPECIAL RULES FOR CIS MEMBER ORGANIZATIONS: CIS reserves the right to create special rules for: (1) CIS Members; and (2) Non-Member
organizations and individuals with which CIS has a written contractual relationship. CIS hereby grants to each CIS Member Organization in good
standing the right to distribute the SB Products within such Members own organization, whether by manual or electronic means . Each such
Member Organization acknowledges and agrees that the foregoing grants in this paragraph are subject to the terms of such Members
membership arrangement with CIS and may, therefore, be modified or terminated by CIS at any time.
1|P a ge
Table of Contents
Overview ................................................................................................................................................. 4
Recommendations................................................................................................................................... 9
1 User Interface Settings ...................................................................................................................... 9
1.1 System Settings .............................................................................................................................. 9
1.1.1 Update 'firmware' to latest version (Not Scored) ..................................................................... 9
1.1.2 Enable 'Password' (Not Scored) ............................................................................................. 10
1.1.3 Enable 'Require alphanumeric value' (Not Scored ) ................................................................ 11
1.1.4 Set 'timeout in minutes' for 'Sleep' (Not Scored) .................................................................... 11
1.1.5 Remove Entries in 'Wi-Fi' (Not Scored) .................................................................................. 12
1.1.6 Disable 'Network Notification' (Not Scored) ........................................................................... 13
1.1.7 Disable 'Wi-Fi' (Not Scored) ................................................................................................... 14
1.1.8 Disable 'Bluetooth' (Not Scored)............................................................................................ 15
1.1.9 Disable 'Location Services' (Not Scored) ................................................................................ 16
1.1.10 Enable 'Airplane Mode' (Not Scored) ................................................................................... 17
1.1.11 Erase all data before return, recycle, reassignment, or other disposition (Not Scored) ......... 18
1.1.12 Disable 'Notifications' (Not Scored) ..................................................................................... 19
1.1.13 Enable 'Lock SI M card' (Not Scored) ..................................................................................... 20
1.1.14 Disable 'make passwords visible' (Not Scored) ..................................................................... 21
1.1.15 Enable 'Encrypt phone ' (Not Scored) ................................................................................... 21
1.1.16 Disable 'developer options' (Not Scored) ............................................................................. 23
1.1.17 Disable 'Unknown sources' (Not Scored) .............................................................................. 24
1.1.18 Limit the 'number of messages' for 'Text message limit' (Not Scored) .................................. 25
1.1.19 Limit the 'number of messages' for 'Multimedia message limit' (Not Scored) ....................... 25
1.2 Browser Settings .......................................................................................................................... 26
1.2.1 Disable 'JavaScript' (Not Scored) ............................................................................................ 26
1.2.2 Enable 'Show security warnings' (Not Scored) ....................................................................... 27
1.2.3 Disable 'Form auto-fill' (Not Scored) ...................................................................................... 28
1.2.4 Disable 'Accept Cookies' (Not Scored) .................................................................................... 29
1.2.5 Enable 'Block pop-ups' (Not Scored) ...................................................................................... 30
2|P a ge
1.2.6 Disable 'plug-ins' (Not Scored) ............................................................................................... 31
1.2.7 Disable 'Remember passwords' (Not Scored) ......................................................................... 32
2 Microsoft Exchange ActiveSync Policy Settings ................................................................................ 32
2.1 Password Settings ........................................................................................................................ 33
2.1.1 Enable 'Require password' (Scored)....................................................................................... 33
2.1.2 Enable 'Require alphanumeric value' (Scored) ....................................................................... 35
2.1.3 Set the 'minimum password length' (Scored) ......................................................................... 36
2.1.4 Set the 'minimum number of character sets' (Scored) ........................................................... 38
2.1.5 Set the 'timeout' for 'Time without user input before password must be re -entered (in
minutes)' (Scored).......................................................................................................................... 40
2.1.6 Limit the 'Number of failed attempts allowed' (Scored) ......................................................... 42
2.1.7 Set the 'number o f days' for 'maximum password age' (Scored) ............................................ 44
2.1.8 Set the 'number o f passwords' for 'password history' (Scored) .............................................. 45
2.1.9 Enable 'Require encryption on the device' (Scored) ............................................................... 46
3 Appendices ..................................................................................................................................... 47
3.1 Additional Information for Exchange ActiveSync Management ..................................................... 48
3.1.1 General ActiveSync Settings ...................................................................................................... 48
3.1.1.1 Disable 'Allow non -provisionable devices' (Not Scored) ...................................................... 48
3.1.2 General Resources for Android Mobile Device ActiveSync Management ................................... 51
3.2 Loss of Physical Custody of an An droid and Compensating Controls ............................................. 51
Appendix: Change History...................................................................................................................... 53
3|P a ge
Overview
This document, Security Configuration Benchmark for Android 4.0, provides prescriptive
guidance for establishing a secure configuration posture for the Android 4.0 OS. This guide was
tested against the Android 4.0 and the Android Virtual Device (AVD) contained in version 4.0.3
of the Android Software Development Kit (SDK). This benchmark covers Android 4.0 and all
hardware devices on which this OS is supported. As of the publication of this guidance, mobile
devices supported by Android 4.0 include the following:
HTC One S (T-Mobile)
HTC One X (AT&T)
HTC EVO 4G LTE (Sprint)
HTC Vivid (AT&T)
HTC Amaze 4G (T-Mobile)
HTC Sensation 4G (T-Mobile)
Samsung Galaxy Nexus (Verizon, Sprint)
Samsung Nexus S 4G (AT&T, Sprint)
In determining recommendations, the current guidance treats all Android mobile device
platforms as having the same use cases and risk/threat scenarios. In all but a very few cases,
configuration steps, default settings, and benchmark recommended settings are identical
regardless of hardware platform. To obtain the latest version of this guide, please
visit http://cisecurity.org. If you have questions, comments, or have identified ways to improve
this guide, please write us at [email protected].
The settings recommended in this benchmark are those available through configuration of the
device either directly through its local interface, through manufacturer-provided external
configuration tools, and through configuration capabilities provided by Exchange ActiveSync
mailbox policies. In considering the recommendations made in this benchmark, the device was
considered both as a target itself and as a method of accessing other resources. These benchmark
settings provide certain protections from remote attacks against the device and from
unauthorized device access in the event the device is lost.
The recommendations do not assert sufficient protections against advanced local attacks to gain
device access or data recovery that may be possible in the event a device is lost. They also do not
discuss custom ROMs or 3rd-party features such as virus or root-kit detection.
Intended Audience
This document is intended for system and application administrators, security specialists,
auditors, help desk, end users, and platform deployment personnel who plan to use,
develop, deploy, assess, or secure solutions that use Android 4.
4|P a ge
Consensus Guidance
This benchmark was created using a consensus review process comprised of volunteer and
contract subject matter experts. Consensus participants provide perspective from a diverse
set of backgrounds including consulting, software development, audit and compl iance,
security research, operations, government, and legal.
Each CIS benchmark undergoes two phases of consensus review. The first phase occurs
during initial benchmark development. During this phase, subject matter experts convene
to discuss, create, and test working drafts of the benchmark. This discussion occurs until
consensus has been reached on benchmark recommendations. The second phase begins
after the benchmark has been released to the public Internet. During this phase, all
feedback provided by the Internet community is reviewed by the consensus team for
incorporation in the benchmark. If you are interested in participating in the consensus
review process, please send us a note to [email protected].
5|P a ge
Typographical Conventions
The following typographical conventions are used throughout this guide:
Convention Meaning
Stylized Monospace font Used for blocks of code, command, and script examples.
Text should be interpreted exactly as presented.
Monospace font Used for inline code, commands, or examples. Text should
be interpreted exactly as presented.
<italic font in brackets> Italic texts set in angle brackets denote a variable
requiring substitution for a real value.
Italic font Used to denote the title of a book, article, or other
publication.
Note Additional information or caveats
Scoring Information
A scoring status indicates whether compliance with the given recommendation impacts the
assessed target's benchmark score. The following scoring statuses are used in this benchmark:
Scored
Failure to comply with "Scored" recommendations will decrease the final benchmark score.
Compliance with "Scored" recommendations will increase the final benchmark score.
Not Scored
Failure to comply with "Not Scored" recommendations will not decrease the final benchmark
score. Compliance with "Not Scored" recommendations will not increase the final benchmark
score.
6|P a ge
Profile Definitions
The following configuration profiles are defined by t his Benchmark:
This profile extends the "Level 1" profile. Items in this profile exhibit one or more of
the following characteristics:
This profile extends the "Level 1" profile. Items in this profile exhibit one or more of
the following characteristics:
7|P a ge
Acknowledgements
This benchmark exemplifies the great things a community of users, vendors, and subject matter
experts can accomplish through consensus collaboration. The CIS community thanks the entire
consensus team with special recognition to the following individuals who contributed greatly to
the creation of this guide:
Author
Robert Fritz
Contributor
Billy Glenn, Pacific Gas & Electric
Fernando Trias
John Fox
Jonathan Trull, State of Colorado
Yves Desharnais
Jiyoung Shin
Jeff Saxton, IBM
Editor
David Skrdla, University of Oklahoma
8|P a ge
Recommendations
1 User Interface Settings
This section provides guidance for securing the mobile device configuration using the
device user interface.
Level 1
Description:
Rationale:
Firmware updates often include critical security fixes that reduce the probability of an
attacker remotely exploiting the device.
Audit:
Remediation:
References:
9|P a ge
1.1.2 Enable 'Password' (Not Scored)
Profile Applicability:
Level 1
Description:
This control determines whether a password is required before allowing access to the
device via the touch screen. It is recommended that a password be set.
Rationale:
Requiring a password to unlock the device increases the effort required to use the device or
access data stored on it.
Audit:
Remediation:
References:
10 | P a g e
1.1.3 Enable 'Require alphanumeric value' (Not Scored)
Profile Applicability:
Level 2
Description:
This control determines whether a password is required before allowing access to the
device via the touch screen must be alphanumeric. It is recommended that passwords be
required to be alphanumeric.
Rationale:
Audit:
Remediation:
Level 1
Description:
This control defines the number of minutes the device can be inactive before requiring the
password be reentered. The recommended setting is 2 minutes or less.
Rationale:
Automatically locking the device after a short period of inactivity reduces the probability of an
attacker accessing the device without entering a password.
Audit:
11 | P a g e
3. Scroll to Personal section.
4. Tap Security.
5. Confirm that Automatically lock is set to "2 minutes after sleep."
6. Press the Back button
7. Scroll to the Device section.
8. Tap Display.
9. Confirm that Sleep is set to "After 2 minutes of inactivity"
Remediation:
References:
Level 2
Description:
This control determines whether the device will forget Wi-Fi networks with which it has
previously associated. It is recommended that networks be forgotten after use in use.
Rationale:
A trusted but unauthenticated Wi-Fi network may be spoofed and automatically joined if it is not
forgotten after last use. Additionally, if such a network has a common SSID, such as "default" or
"Linksys," it is probable that the device will encounter an untrusted instance of a same-named
Wi-Fi network and automatically join it. During test, a 2.1 device did not automatically rejoin an
unauthenticated network with the same SSID as a previously-stored authenticated
network. However, this behavior should not be assumed.
Audit:
12 | P a g e
1. Press the Menu button.
2. Tap System settings.
3. Scroll to Wireless & networks.
4. Tap More... if present
5. Tap Wi-Fi.
6. Confirm that all deleted Wi-Fi networks are forgotten.
Remediation:
Note: Wi-Fi must be turned onto see the list of available networks to configure. The Wi-Fi
network must be remembered or currently connected to "Forget" a network.
References:
Level 1
Description:
When the user is trying to access the Internet, by using the built-in browser for example, and the
user is not in range of a Wi-Fi network the user has previously used, this option tells the device
to look for another network. When selected and a new network is available, an icon will appear
on the status bar, which in turn makes available a list of available networks from which the user
can choose. If "Network notification" is turned off, the user must manually search for a network
to connect to the Internet when a previously used network or a cellular data network is not
available. It is recommended that this capability be disabled in environments where security is
paramount.
Rationale:
Requiring the user to manually configure and join a Wi-Fi network reduces the risk of
inadvertently joining a similarly named yet untrusted network (i.e. "default" vs. "default").
13 | P a g e
Audit:
Remediation:
Note: Wi-Fi must be turned on for the above Wi-Fi configuration option to appear.
References:
Level 2
Description:
The device can be configured to participate in Wi-Fi networks. It is recommended that Wi-
Fi be disabled when not needed or where security is paramount.
If Wi-Fi is turned off on a device with cellular data service, connections to the Internet will occur
via the cellular data network, when available. Applications such as the built-in Android browser,
Gmail, Google Voice, Maps, News & Weather, and the Android Market can be run over a
cellular data network connection, but there may be a limit on the maximum download size of
items for certain apps.
Rationale:
Disabling the Wi-Fi interface reduces the remote attack surface of the device. Additionally, at
present, the cellular data network is a more difficult medium to sniff than Wi-Fi.
14 | P a g e
Audit:
Remediation:
References:
Level 1
Description:
Bluetooth allows devices to connect wirelessly to headsets, car kits, and other accessories for
various Bluetooth profile functionality. It is recommended that Bluetooth be disabled when not
in use.
Rationale:
If the user does not need Bluetooth enabled, it should be disabled to prevent discovery of and
connection to supported Bluetooth services.
Audit:
Remediation:
15 | P a g e
1. Press the Menu button.
2. Tap System settings.
3. Scroll to Wireless & networks.
4. Slide the Bluetooth switch to Off.
References:
Level 2
Description:
Location Services allows applications such as Maps and Internet websites to gather and use data
indicating the user's location. The user's approximate location is determined using available
information from cellular network data, local Wi-Fi networks (if the user has Wi-Fi turned on),
and GPS as available. If the user turns off Location Services, the user will be prompted to turn it
back on again the next time an application tries to use this feature. It is recommended that
location services be disabled when not required.
Rationale:
Disabling location services reduces the capability of an attacker to determine or track the
user's location via websites, locally installed applications or other means.
Audit:
Remediation:
16 | P a g e
1. Tap the globe Browser icon.
2. Press the Menu button.
3. Tap Settings.
4. Tap Privacy & security.
5. Scroll to Location
6. Uncheck "Enable location."
7. Press the Home button.
8. Press the Menu button.
9. Tap System settings.
10. Scroll to Personal section.
11. Tap Location services.
12. Uncheck Google's location service
13. Uncheck GPS satellites.
References:
Level 2
Description:
This control determines whether all of the devices receivers and transceivers can receive and
transmit radio signals. This option is called Airplane Mode ("Flight Mode" on some phones).
When Airplane Mode is enabled, no phone, GPS, radio, Wi-Fi, or Bluetooth signals are emitted
from or received by the device. The recommended setting is enabled when these capabilities are
unnecessary.
Rationale:
If the user enters an environment where signal transmission or reception are unnecessary then
enabling Airplane Mode eliminates the remote attack surface of the device.
Audit:
Remediation:
17 | P a g e
1. Press the Menu button.
2. Tap System settings.
3. Scroll to Wireless & networks.
4. Tap More... if present
5. Check "Airplane Mode."
References:
Level 1
Description:
This control deletes all data, including accounts, from the device's internal storage and restores
the device to factory default settings.
Rationale:
Deleting data stored on the device before returning, recycling or disposing of the device
reduces the probability of an attacker subsequently accessing confidential information
previously stored on the device.
Audit:
To verify that the Android device's storage has been overwritten, it is necessary to install a
forensics recovery toolkit that is not within the scope of this document. Please review the
references for more information.
Remediation:
18 | P a g e
9. Tap Next.
10. Tap Erase everything.
References:
Level 2
Description:
This control determines whether notifications are displayed on screen when the device is locked.
The recommended setting is disabled.
Rationale:
If the device becomes lost or is unattended then disabling notifications reduces the
capability of an attacker to obtain confidential information displayed on the screen.
Audit:
Remediation:
References:
19 | P a g e
1.1.13 Enable 'Lock SIM card' (Not Scored)
Profile Applicability:
Level 1
Description:
On applicable phones, SIM cards often contain contact and other personal information. This
setting will lock the SIM card so that it requires a PIN to access.
Rationale:
Parties who do not know the SIM PIN should not be able to view the SIM card's contents, nor
use the SIM card in another mobile device.
Audit:
Remediation:
References:
20 | P a g e
1.1.14 Disable 'make passwords visible' (Not Scored)
Profile Applicability:
Level 1
Description:
This control determines whether passwords are displayed as they are typed. The
recommended setting is disabled.
Rationale:
Enforcing this control reduces the capability of an attacker to observe user input and learn
the device password.
Audit:
Remediation:
References:
Level 1
Description:
Mobile devices not only contain information, they also contain passwords and other credentials
that can enable an attacker to retrieve confidential data from other sources the device may
interact with. Note that the encryption process requires an hour or more, a fully-charged battery,
21 | P a g e
and that the phone remains plugged in until the process is complete. If the encryption process is
interrupted, some or all data may be lost.
Rationale:
Once the phone is encrypted, a numeric PIN or password is required each time the phone is
powered on, protecting personal data that would otherwise be easily recovered through a variety
of methods. The phone cannot be unencrypted except by performing a factory data reset, which
will erase all data on the phone.
A phone encrypted in this manner is better than an unencrypted phone. However, the particular
way that Android implements their encryption deserves some caveats. The encryption
technology used in Android 3 is dm-crypt. The encryption uses a symmetric key, which is
derived from the password/PIN typed by the user; the derivation parameters are stored in a
LUKS-formatted block on the device itself. Password derivation is salted and uses multiple
iterations, with PBKDF2. One consequence of that is that an attacker can do an offline dictionary
attack: when he gets the device, he does a raw dump of the partition into a PC, then "tries"
passwords. The LUKS block contains enough information to verify whether a potential password
is correct or not.
PBKDF2 uses salts and iterations to make the search less efficient, but there are limitations to
what PBKDF2 can achieve. PBKDF2 makes key derivation (from the password) slow for the
attacker and for the mobile phone itself alike. It must not use too many iterations, because the
user is not ready to wait more than, say 3 or 4 extra seconds upon boot. An attacker can be
expected to have more computing power and more patience (if the data is valuable, the attacker
is ready to invest one hour or two of computation). Therefore, a 4-digit PIN will not last long in
that situation. On the other hand, most users are not prepared to type in a long, high -entropy
password on your phone at each boot.
Audit:
Remediation:
22 | P a g e
9. Tap Continue.
10. Tap Encrypt phone.
References:
Level 1
Description:
The operating system allows developers to change phone behavior, interact with the device, issue
commands, and read storage. The recommended settings is disabled.
Rationale:
Disabling command and data functions reduces the attack surface of the device. Since the same
port is used to charge the phone, combined with the common availability in airports and other
public places for phone charging, it is important to ensure that charging the phone does not open
an attack vector.
Audit:
Remediation:
23 | P a g e
6. Uncheck Stay awake.
7. Uncheck Mock locations.
References:
Level 1
Description:
This control determines whether applications can be installed from locations other than Google
Play. The recommended setting is disabled.
Rationale:
Audit:
Remediation:
References:
24 | P a g e
1.1.18 Limit the 'number of messages' for 'Text message limit' (Not
Scored)
Profile Applicability:
Level 2
Description:
This control limits the number of messages saved per thread of text messages. When the
limit is reached older messages are deleted if 'Delete old messages' is enabled. The
recommended setting is 100 or less messages saved.
Rationale:
Limiting the number of messages saved on the device potentially reduces the scope of
information disclosure in the event of device compromise.
Audit:
Remediation:
References:
Description:
This control limits the number of messages saved per thread of multimedia messages.
When the limit is reached older messages are deleted if 'Delete old messages' is enabled.
The recommended setting is 20 or less messages saved.
Rationale:
Limiting the number of messages saved on the device potentially reduces the scope of
information disclosure in the event of device compromise.
Audit:
Remediation:
References:
This section provides guidance on the secure configuration of settings related to the built -in
browser.
26 | P a g e
Level 2
Description:
This control determines whether JavaScript programming code is allowed run in the browser.
The recommended setting is disabled.
Rationale:
JavaScript lets web programmers control elements of the page, for example: a page that uses
JavaScript process may process login credentials or cause a linked page to appear in a new pop -
up page. JavaScript should only be enabled when browsing trusted sites.
Audit:
Remediation:
References:
Level 1
Description:
This control determines whether the browser displays security warnings about websites with
common security problems such as outdated or invalid certificates. The recommended setting is
enabled.
Rationale:
27 | P a g e
Enforcing this control reduces the probability that invalid certificates can be used to
provide unauthorized access to confidential information or breach its integrity.
Audit:
Remediation:
References:
Level 1
Description:
This control determines whether data entered into web forms are stored enabling auto-
completion of the form upon subsequent visits to the site. The recommended setting is disabled.
Rationale:
Enforcing this control reduces the probability of an attacker obtaining or using confidential
information stored on the device such as names, credit card numbers and passwords.
Audit:
28 | P a g e
7. Press the Back button.
8. Tap General.
9. Uncheck Form auto-fill.
10. Verify that Form auto-fill is unchecked.
Remediation:
References:
Level 2
Description:
This control determines whether the device browser will accept and store HTTP cookies
sent by websites the user accesses. The recommended setting is disabled.
Rationale:
Audit:
29 | P a g e
Remediation:
References:
Level 1
Description:
The Pop-up Blocker is used to block pop-ups which a website might open with or without
any user interaction. These pop-ups can be used to open untrusted malicious content. The
recommended setting is enabled.
Rationale:
Enabling the Pop-up Blocker will block all pop-ups to guard a user against any attacks
launched using pop-up windows.
Audit:
Remediation:
30 | P a g e
4. Tap Advanced.
5. Check "Block pop-ups."
References:
Level 2
Description:
This control determines whether plug-ins are allowed run in the browser. The recommended
setting is disabled.
Rationale:
Flash and other plug-ins let web programmers control elements of the page, for example: a page
that uses Flash processing may process login credentials or cause a linked page to appear in a
new pop-up page. Plug-ins should only be enabled when browsing trusted sites.
Audit:
Remediation:
References:
31 | P a g e
1.2.7 Disable 'Remember passwords' (Not Scored)
Profile Applicability:
Level 1
Description:
This control determines whether passwords entered into web forms are stored enabling auto -
completion of the form upon subsequent visits to the site. The recommended setting is disabled.
Rationale:
Enforcing this control reduces the probability of an attacker obtaining or using passwords stored
on the device.
Audit:
Remediation:
References:
Please note the device supports adding multiple accounts and syncing information from multiple
Exchange servers as well as other types of email accounts. Each of these accounts may have
32 | P a g e
security policies that are enforced per account setup on the device. If accounts have conflicting
security policy settings then the device enforces the strictest rules set by any account for each
kind of policy. No account policy can relax the degree of security set by another account policy.
For more information about Microsoft Exchange Information Services and security policies
supported see: http://en.wikipedia.org/wiki/Comparison_of_Exchange_ActiveSync_clients
Reference:
Description:
This control determines whether a password is required before allowing access to the device via
the touch screen. It is recommended that a password be set.
Rationale:
Requiring a password to unlock the device increases the effort required to use the device or
access data stored on it.
Audit:
33 | P a g e
1. Enter the following command (all one line):
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which the audit
validation should be made (replace brackets and text with appropriate policy name).
2. Search the policy setting output for the "DevicePasswordEnabled :" configuration item.
3. Observe if the value following the colon is "True" as shown below:
DevicePasswordEnabled : True
Remediation:
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which the
configuration should be made (replace brackets and text with appropriate policy name).
References:
1. For full details, please refer to the CIS Security Configuration Benchmark for Microsoft Exchange
Server 2007, version 1.1.0, Section 8.16: Require ActiveSync Password.
2. Microsoft Technet Library Article: Configure Device Password Locking:
http://technet.microsoft.com/en-us/library/bb125004.aspx
34 | P a g e
2.1.2 Enable 'Require alphanumeric value' (Scored)
Profile Applicability:
Description:
This control determines if new passwords are required to satisfy a certain level of
complexity. The recommended settings are enable alpha-numeric device password.
Rationale:
Audit:
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which the audit
validation should be made (replace brackets and text with appropriate policy name).
35 | P a g e
3. Observe if the value following the colon is "True" as shown below:
AlphanumericDevicePasswordRequired :True
Remediation:
where <PolicyName> is the name of the Exchange ActiveSync ma ilbox policy for which the
configuration should be made (replace brackets and text with appropriate policy name).
References:
1. CIS Security Configuration Benchmark for Microsoft Exchange Server 2007, version 1.1.0, Section
8.17: Require ActiveSync Alphanumeric Password
2. Microsoft Technet Library Article: Configure Device Password Locking:
http://technet.microsoft.com/en-us/library/bb125004.aspx
Description:
36 | P a g e
This control defines the minimum number of characters a user password must contain. The
recommended setting is 5 or more characters.
Rationale:
Enforcing a minimum password length helps protect against brute force and dictionary attacks,
and increases the efficacy of password-based authentication systems. Additionally, requiring at
least five characters prevents a user from selecting typically weak values, such as a year, date, or
last four digits of a phone number, for their password.
Audit:
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which the audit
validation should be made (replace brackets and text with appropriate policy name).
2. Search the policy setting output for the MinDevicePasswordLength configuration item.
3. Observe if there is a value following the colon and that the value is set to 5 as shown below:
MinDevicePasswordLength : 5
Remediation:
37 | P a g e
In the "Properties" configuration window,
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which the
configuration should be made (replace brackets and text with appropriate policy name).
References:
1. CIS Security Configuration Benchmark for Microsoft Exchange Server 2007, version 1.1.0, Section
8.18: Require ActiveSync Minimum Password Length
2. Microsoft Technet Library Article: Configure Device Password Locking:
http://technet.microsoft.com/en-us/library/bb125004.aspx
Description:
This control determines if new passwords are required to satisfy a certain level of
complexity. The recommended setting is the minimum device password complexity is set
to 1 or more characters.
Rationale:
Audit:
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which the audit
validation should be made (replace brackets and text with appropriate policy name).
Remediation:
39 | P a g e
1. Enter the following command (all one line):
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which the
configuration should be made (replace brackets and text with appropriate policy name).
References:
1. CIS Security Configuration Benchmark for Microsoft Exchange Server 2007, version 1.1.0, Section
8.17: Require ActiveSync Alphanumeric Password
2.1.5 Set the 'timeout' for 'Time without user input before password
must be re-entered (in minutes)' (Scored)
Profile Applicability:
Description:
This control defines the number of minutes the device can be inactive before requiring the
password be reentered. The recommended setting is 2 minutes or less.
Rationale:
Automatically locking the device after a short period of inactivity reduces the probability of an
attacker accessing the device without entering a password.
Audit:
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which the audit
validation should be made (replace brackets and text with appropriate policy name).
MaxInactivityTimeDeviceLock :2
Remediation:
where <PolicyName> is the name of the Exchange ActiveSync mail box policy for which the
configuration should be made (replace brackets and text with appropriate policy name) and
41 | P a g e
specifying the time in minutes as appropriate according to use case and device as described for
the EMC above.
References:
1. CIS Security Configuration Benchmark for Microsoft Exchange Server 2007, version 1.1.0, Section
8.26: Require ActiveSync Inactivity Lockout Time
2. Microsoft Technet Library Article: Configure Device Password Locking
http://technet.microsoft.com/en-us/library/bb125004.aspx
Description:
If the password setting is enabled then this control defines the number of failed login attempts
before all information stored on the device is deleted and the device is automatically reset to
original factory settings. The recommended setting is 6 or less failed attempts.
Rationale:
If the password setting is enabled then enforcing an account lockout threshold deletes data stored
on the device reducing the probability of an attacker accessing confidential information stored on
a lost or stolen device.
Audit:
42 | P a g e
Get-ActiveSyncMailboxPolicy -Identity "<PolicyName>"
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which the audit
validation should be made (replace brackets and text with appropriate policy name).
MaxDevicePasswordFailedAttempts : 6
Remediation:
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which the
configuration should be made (replace brackets and text with appropriate policy name).
References:
1. CIS Security Configuration Benchmark for Microsoft Exchange Server 2007, version 1.1.0, Section
8.24: Require ActiveSync Maximum Password Attempts
43 | P a g e
2. Microsoft Technet Library Article: Configure Device Password Locking
http://technet.microsoft.com/en-us/library/bb125004.aspx
2.1.7 Set the 'number of days' for 'maximum password age' (Scored)
Profile Applicability:
Description:
This control defined how many days a user can use the same password before it expires.
The recommended state for this setting is 90 days or less.
Rationale:
Enforcing a reasonably short password age will increase the efficacy of password-based
authentication systems by reducing the opportunity for an attacker to leverage a known
credential.
Audit:
In EMShell:
1. Enter
Remediation:
44 | P a g e
In EMShell:
1. Enter
References:
1. CIS Security Configuration Benchmark for Microsoft Exchange Server 2007, version 1.1.0, Section
8.19: Require ActiveSync Password Expiration.
Description:
This control defines the number of unique passwords a user must leverage before a
previously used password can be reused. The recommended state for this setting is 24 or
more passwords remembered.
Rationale:
Enforcing a sufficiently long password history will increase the efficacy of password-based
authentication systems by reducing the opportunity for an attacker to leverage a known
credential. For example, if an attacker compromises a given credential that is then expired,
this control prevents the user from reusing that same compromised credential.
Audit:
In EMShell:
1. Enter:
45 | P a g e
Get-ActiveSyncM
Remediation:
In EMShell:
1. Enter:
References:
1. CIS Security Configuration Benchmark for Microsoft Exchange Server 2007, version 1.1.0, Section
8.20: Require ActiveSync Password History
Description:
Rationale:
Audit:
46 | P a g e
2. Password Tab
3. Require encryption on device
In EMShell
1. Enter:
Remediation:
In EMShell:
1. Enter:
References:
1. CIS Security Configuration Benchmark for Microsoft Exchange Server 2007, version 1.1.0, Section
8.21: Require ActiveSync Encryption.
3 Appendices
47 | P a g e
3.1 Additional Information for Exchange ActiveSync
Management
Microsoft Exchange ActiveSync is a Microsoft Exchange mobile device communication and
synchronization protocol based on HTTP and XML that allows mobile devices to access
information on a Microsoft Exchange server. Exchange ActiveSync enables mobile phone
users to access e-mail, calendar, contacts, and tasks and provides access to certain features
that allow for the enforcement of security policies on mobile devices. Multiple policies can
be created as needed to reflect organizational groups, device types, or combinations as
desired; however, the policies are applied to users/user mailboxes and not devices
specifically, and a user can belong to only one Exchange ActiveSync mailbox policy at a
time.
Security configuration items that can be applied include the initiation of a remote wipe of a
managed device and the enforcement of five password configuration policies (specifically:
requiring a password, setting a minimum password length, requiring an alphanumeric
password, requiring a complex password, and setting an inactivity time lockout) through
the creation and application of an Exchange ActiveSync mailbox policy for a user. These
ActiveSync configuration items can be applied through one or more of the following
management interfaces: the MS Exchange Management Console (EMC), the MS Exchange
Management Shell, the Microsoft Exchange Server ActiveSync Web Administration Tool,
and the Outlook Web Access Mobile Device Management interface.
The Client Access server role has been installed on the Exchange Server.
The appropriate Client Access Permissions have been assigned to permit the indicated
configurations.
Exchange ActiveSync is enabled for the user.
The device ID for the mobile device has not been specifically removed from the
ActiveSyncAllowedDeviceIDs parameter list
An Exchange ActiveSync mailbox policy to be configured has already been created.
Description:
For a given mailbox policy, Microsoft Exchange ActiveSync classifies a mobile device
attempting to connect as one of two typesa provisionable device or a non-provisionable
devicebased on the device's ability to comply with the policy. Provisionable devices are
devices that are capable of fully applying and enforcing a specified policy. Non-provisionable
devices are devices that are capable of applying and enforcing only a subset of a policy, or even
none of a policy.
This ActiveSync policy setting specifies whether a mobile device that cannot support the
application of all policy settings can connect to MS Exchange through Exchange
ActiveSync. By default, Exchange ActiveSync allows non-provisionable devices to connect
through Exchange ActiveSync. To ensure that mobile devices connect only when the full policy
can be assured, non-provisionable devices must be disallowed.
Rationale:
Restricting the devices which can connect to MS Exchange through ActiveSync to only those
which can fully support the policy specified is the only way that Exchange ActiveSync can
assure that an Android device is configured fully according to the specified policy. If a device
that does not meet any or all of the policy configuration items can continue to connect to
Exchange ActiveSync and access the resources provided through the ActiveSync connection, the
initial and continued enforcement of policy controls cannot be assured and intended device
security is highly reduced.
Audit:
49 | P a g e
Get-ActiveSyncMailboxPolicy -Identity "<PolicyName>"
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which the audit
validation should be made (replace brackets and text with appropriate policy name).
3. Search the outputted policy setting list for the "AllowNonProvisionableDevices :" configuration
item.
4. Observe if the value following the colon is "False" as shown below:
Remediation:
where <PolicyName> is the name of the Exchange ActiveSync mailbox policy for which
the configuration should be made (replace brackets and text with appropriate policy
name).
References:
50 | P a g e
1. Microsoft Technet Library Article: View or Configure Exchange ActiveSync Mailbox Policy
Properties http://technet.microsoft.com/en-us/library/bb123994.aspx
1. Microsoft Corporation (2011). Microsoft Technet Library Article: Exchange 2010 Client Access
Cmdlet Set-ActiveSyncMailboxPolicy Parameter Information. Available:
http://technet.microsoft.com/en-us/library/bb123756.aspx. Last accessed 27 September 2012.
2. Microsoft Corporation (2011). Microsoft Technet Library Article: Exchange 2010 Client Access
Cmdlet Get-ActiveSyncMailboxPolicy Parameter Information. Available:
http://technet.microsoft.com/en-us/library/bb124900.aspx. Last accessed 27 September 2012.
3. Microsoft Corporation (2007). Microsoft Technet Library Article: New User's Guide to the
Exchange Management Console. Available: http://technet.microsoft.com/en -
us/library/bb245702%28EXCHG.80%29.aspx. Last accessed 27 September 2012.
4. Microsoft Corporation (2007). Microsoft Technet Library Article: A Primer on the Exchange
Management Shell. Available: http://technet.microsoft.com/en -
us/library/bb245704%28EXCHG.80%29.aspx. Last accessed 27 September 2012.
5. Microsoft Corporation (2009). Microsoft Technet Library Arti cle: Exchange Management Shell in
Exchange 2010. Available: http://technet.microsoft.com/en -us/library/dd795097.aspx. Last
accessed 27 September 2012.
6. Microsoft Corporation (2011). Microsoft Technet Library Article: Exchange Management Console
(MS Exchange 2010). Available: http://technet.microsoft.com/en-us/library/bb123762.aspx. Last
accessed 27 September 2012.
7. Microsoft Corporation (2009). Microsoft Technet Library Article: Exchange Management Shell
(MS Exchange 2010). Available: http://technet.microsoft .com/en-us/library/bb123778.aspx. Last
accessed 27 September 2012.
Certain non-configuration controls are available through 3rd-party tools and should be
considered.
A remote wipe feature can be activated as a compensating corrective control, available through
the following mechanisms:
51 | P a g e
Exchange ActiveSync Mobile Administration Web Tool (MS Exchange Server 2007 and MS
Exchange Server 2010)
Exchange Management Console (MS Exchange Server 2010)
Third-party encryption apps are available to protect the confidentiality of data for advanced
applications and should be considered where advanced protections are required. User-level
configuration was introduced in Android 3.0 (Honeycomb).
For more information about Microsoft Exchange Information Services and security policies
supported see: http://en.wikipedia.org/wiki/Comparison_of_Exchange_ActiveSync_clients
52 | P a g e
Appendix: Change History
Date Version Changes for this version
10-01-2012 1.0.0 Initial release
53 | P a g e