Examples of security policy goals
7
Consider using IT policies and application control policies to meet your organization's security policy goals.
Example goal
Description
Define acceptable use of passwords for
authentication on BlackBerry®
devices.
•
Require a password on the BlackBerry device.
•
Configure features such as password duration, length, and strength.
•
Require password patterns.
•
Forbid specific passwords.
Define the encryption strength that
BlackBerry devices use to protect data.
•
Extend encryption of data in transit between the sender and recipient of an
email or PIN message.
•
Require the BlackBerry device to generate and use the content protection
key to encrypt user data while the BlackBerry device is locked.
•
Require the BlackBerry device to generate and use the grand master key to
encrypt the master encryption key while the BlackBerry device is locked.
•
To require a specific standard of encryption strength, specify the level of
FIPS compliance for the embedded cryptographic module that is required
for basic operation of the BlackBerry device.
Control application installation and
use on BlackBerry devices.
•
Prevent BlackBerry device users from downloading third-party applications
over the wireless network.
•
Specify whether applications on the BlackBerry device can establish
specific types of connections.
Block viruses and malicious user
actions on BlackBerry devices.
•
Specify the resources (for example, email, phone, and BlackBerry device key
store) that a third-party application can access on the BlackBerry device.
•
Specify the types of connections (for example, local, internal, and external)
that a third-party application that is running on the BlackBerry device can
establish.
•
Specify whether an application can access the user authenticator
framework API, which permits the registration of drivers to provide two-
factor authentication to unlock the BlackBerry device.
Control Bluetooth® technology use on
BlackBerry devices.
•
Manage Bluetooth technology on BlackBerry devices.
•
Prevent the use of Bluetooth technology on BlackBerry devices.
Policy Reference Guide
Examples of security policy goals
193