logo

Database

Summary

The system must keep mobile devices communication protocols hidden, protected with credentials or turned off. This refers to protocols that allow data exchange such as Bluetooth, NFC and Tethering.

Description

This is requirement emphasizes in protecting mobile devices against unauthorized access by using different types of attacks, such as Bluejacking, Bluesnarfing, eavesdropping, data interception, etc. Turning off or securing communication protocols that are not actively used reduces the attack surface of the mobile device.

Supported In

This requirement is verified in following services

Essential Plan

No

Advanced Plan

Yes