No | Recommendation | Justification | ![]() | ![]() | ![]() |
---|---|---|---|---|---|
Organizational recommendations | |||||
one | Develop a Bluetooth wireless security organization policy. | Security policy is the basis for all other countermeasures. | + | ||
2 | Make sure that all Bluetooth users are familiar with the safety rules for using Bluetooth. | A security awareness program helps users follow a practice that helps prevent security incidents. | + | ||
3 | Regularly conduct comprehensive Bluetooth security assessments. | Security assessments help identify the Bluetooth devices used in the organization, as well as help ensure compliance with wireless security policies. | + | ||
four | Ensure that the Bluetooth wireless devices used are fully architecturally understood and documented accordingly. | Bluetooth-enabled devices can contain various network technologies and interfaces that allow you to connect to local and global networks. The organization must understand the overall connectivity of each device to identify possible risks and vulnerabilities. These risks and vulnerabilities can then be leveled out in a wireless network security policy. | + | ||
five | Provide users with a list of precautions they need to take to better protect Bluetooth-enabled handheld devices from theft. | The organization and its employees are responsible for their Bluetooth-enabled devices, because stealing these devices could lead to information security incidents. | + | ||
6 | Keep a complete inventory of all wireless devices and Bluetooth addresses (BD_ADDRs). | A complete inventory of Bluetooth devices can be provided as part of an audit to identify unauthorized devices. | + | ||
Technical recommendations | |||||
7 | Change the default Bluetooth settings to match your organization’s security policy. | Since the default settings are generally not secure, you must carefully examine these settings to ensure that they comply with the organization’s security policy. For example, it is usually necessary to change the device name (i.e. so that it does not display the type of platform). | + | ||
eight | Set Bluetooth devices to the lowest necessary and sufficient power level so that the radius of the signal remains within the organization’s protected perimeter. | Installing Bluetooth devices with the minimum necessary and sufficient power level provides secure access to authorized users. Class 1 devices should be avoided, as well as external amplifiers or high gain antennas due to their extended range. | + | ||
9 | Choose PINs that are reasonably random, long and private. Avoid static and weak PIN codes, for example, 000000. | PINs must be random so that attackers cannot easily guess them. Longer PIN codes are more resistant to brute-force attacks. For Bluetooth 2.0 devices (or earlier versions), use an eight-letter alphanumeric PIN if possible. Using a single PIN is unacceptable. | + | ||
ten | Make sure the connection keys (session keys / link keys) are not based on device keys. | The use of “shared link keys” has been deprecated since Bluetooth 1.2. | + | ||
eleven | Do not use the “Just Works” pairing mode for Bluetooth 2.1 and higher devices using SSP . | “Just Works” pairing mode does not provide protection from MITM. NIST does not even recommend purchasing them. | + | ||
12 | For devices with Bluetooth 2.1 and later versions using the SSP, random and unique access keys based on the Passkey Entry association model should be used for each pairing. | If the same access key is used for multiple pairings, then the protection against MITM attacks provided for in the Passkey Entry pairing model is significantly reduced. | + | ||
13 | If a device with Bluetooth versions 2.1 and later, using Security Mode 4, needs to connect to older Bluetooth versions that do not support Security Mode 4, then this device should be rolled back to Security Mode 3. | Bluetooth specifications allow the 2.1 device to revert to any Security Mode for backward compatibility. This allows you to return to protection modes 1-3. As previously discussed, security mode 3 provides better security. | + | ||
14 | Low energy Bluetooth devices with versions 4.0 and 4.1 should use Security Mode 1 Level 3 when possible | The remaining modes are unsafe. | + | ||
15 | Low energy Bluetooth devices with version 4.2 and above should use Security Mode 1 Level 4 if possible. | This mode allows you to provide the maximum level of security for such devices. | + | ||
sixteen | Bluetooth BR / EDR devices with versions 4.0 and 4.1 should use Security Mode 4 Level 4 if possible. | If Security Mode 4 Level 4 is not supported, then you should use Security Mode 4 Level 3 instead. | + | ||
17 | Unapproved services and profiles should be disabled. | Most Bluetooth stack implementations support multiple profiles and related services. It is recommended to allow only necessary profiles and services. | + | ||
18 | Bluetooth devices should be configured as default “Non-detectable”, except when necessary for mating. | This setting will hide the Bluetooth device from other devices. | + | ||
nineteen | You must use connection encryption. | Without using connection encryption, data transmission is vulnerable to listening to the broadcast. | + | ||
20 | If you are using a multi-beam wireless connection, make sure that encryption is enabled on each connection in the chain. | One unsecured connection leads to a compromise of the entire communication chain. | + | ||
21 | Ensure that all connections are mutually authenticating the device. | To ensure authentication of all devices on the network, mutual authentication is required. | + | ||
22 | Enable encryption for all broadcasts (encryption mode 3). | Broadcast transmissions that are protected by encrypting connections provide a level of security that protects these transmissions from interception. | + | ||
23 | Adjust the size of the encryption keys as long as your device allows. | Using the maximum allowed key sizes provides protection against brute force attacks. | + | ||
24 | Bluetooth devices must request the user to authorize all incoming Bluetooth connection requests before allowing all incoming connection requests. | Users should also not accept connections, files, or other objects from unknown or unreliable sources. | + | ||
25 | Use application-level authentication and encryption over the Bluetooth stack for sensitive data transfer. | Since devices can automatically connect to previously connected devices, it is advisable to use applications that additionally implement encryption and authentication functions. | + | ||
26 | Add layers to authenticate users, such as biometrics, smart cards, two-factor authentication, or PKI. | Implementing powerful authentication mechanisms can minimize password and PIN-related vulnerabilities. | + | ||
27 | If you are using Mobile Device Management (MDM) solutions, make sure that your organization’s Bluetooth security policy is properly enforced using the technical tools you use. | Security policies can be applied by MDM solutions. The default settings are generally unsafe. You must carefully study these parameters to ensure that they comply with the organization’s security policy. | + | ||
Operational requirements | |||||
28 | Make sure the Bluetooth features are disabled when not in use. | Bluetooth should be turned off on all devices, unless the user explicitly allows Bluetooth to establish a connection. This minimizes the impact of potential malicious acts. For devices that do not support turning off Bluetooth (for example, a headset), the entire device should be turned off if it is not used. | + | ||
29 | Perform pairing as seldom as possible, ideally in a secure area where attackers cannot intercept frames that exchange access keys when pairing. (Note: “safe area” is defined as a non-public area located in the premises away from windows in places with physical access control.) Users should not respond to any message requesting a PIN code if the user has not initiated the pairing and is not sure that the PIN code request is sent by one of the user's devices. | Pairing is an important security feature and requires users to be aware of possible listening devices. If an attacker can capture the transmitted frames associated with pairing, the definition of the link key is simple for devices with Bluetooth all versions up to 2.1 and another 4.0, since security depends solely on the entropy and the length of the PIN code. | + | ||
thirty | Bluetooth BR / EDR in Security Mode 2 or 4 must be used in a controlled area. | NIST strongly recommends that Bluetooth BR / EDR devices use security mode 3. | + | ||
31 | Ensure that portable Bluetooth devices are configured to use a password. | This helps prevent unauthorized access if the device is lost or stolen. | + | ||
32 | If a Bluetooth device is lost or stolen, users must immediately remove the missing device from the list of paired devices in all other Bluetooth devices. | This policy will prevent an attacker from using a lost or stolen device to access another Bluetooth device owned by the user. | + | ||
33 | Install antivirus software on Bluetooth-enabled hosts that support such software. | Antivirus software helps prevent malware from appearing on your Bluetooth network. | + | ||
34 | Regularly deploy Bluetooth software updates and firmware updates. | Patches must be fully tested before deployment to confirm that they are effective. | + | ||
35 | Users should not accept transmissions of messages, files and images from unknown or suspicious devices. | With the increase in the number of devices with Bluetooth support, it is important that users only establish connections with other trusted devices and receive content only from these trusted devices. | + | ||
36 | It is necessary to fully analyze the implications of deploying any security features or product prior to deployment. | To ensure successful deployment, an organization must fully understand the technical, protective, operational and personnel requirements prior to implementation. | + | ||
37 | You must select a person to track the release of new versions of Bluetooth, as well as security standards (for example, via Bluetooth SIG), the emergence of new vulnerabilities and attacks. | A person assigned to track the latest technologies, standards and risks will help ensure the continued safe use of Bluetooth. | + |
Source: https://habr.com/ru/post/419435/
All Articles