S 4.8 Bluetooth
Description
Bluetooth is an open industrial standard for a public domain short-range radio procedure for wireless voice and data communications between IT devices (cable substitute and ad-hoc networking). The development of Bluetooth can be attributed to a initiative of the Bluetooth Special Interest Group (Bluetooth SIG), which a large number of manufacturers belong to, in 1998.
Bluetooth may be used to quickly and easily connect mobile terminal devices with the help of a radio interface. Different Bluetooth profiles defined in the devices then allow for transmission of data, voice signals, control information, up to the provision of services such as FTP or modem and network services, for example. Just like WLAN, Bluetooth uses the public domain ISM band between 2.402 GHz and 2.480 GHz, but only has a range of approx. 100 m. As opposed to infrared, Bluetooth does not require a line of sight between the individual terminal devices, however. Bluetooth is predominantly used for mobile terminal devices such as mobile phones, PDAs, or laptops.
This module describes a systematic way for securely using Bluetooth-enabled terminal devices in an organisation.
Threat scenario
The following typical threats to the IT-Grundschutz are assumed to exist regarding the use of Bluetooth:
Force Majeure
T 1.17 | Failure or malfunction of a wireless network |
Organisational Shortcomings
T 2.1 | Lack of, or insufficient, rules |
T 2.2 | Insufficient knowledge of rules and procedures |
Human Error
T 3.3 | Non-compliance with IT security measures |
T 3.38 | Errors in configuration and operation |
T 3.43 | Inappropriate handling of passwords |
Technical Failure
T 4.60 | Uncontrolled radio wave propagation |
T 4.79 | Vulnerabilities in Bluetooth implementation |
T 4.80 | Poor-quality or missing Bluetooth security mechanisms |
Deliberate Acts
T 5.28 | Denial of services |
T 5.143 | Man-in-the-middle attack |
T 5.159 | Creation of movement profiles using Bluetooth |
T 5.160 | Abuse of the Bluetooth profiles |
Method recommendation
To secure the information system examined, other modules will need to be implemented in addition to this module. These modules are selected based on the results of the IT-Grundschutz modelling process.
In order to enable the secure use of Bluetooth, all clients connected must also be configured securely. Suitable security recommendations for clients are described in the modules in layer 3.
A series of safeguards must be implemented when using Bluetooth, starting in the conception phase and continuing through the purchasing phase to the operation phase. The steps to take to accomplish this as well as the safeguards to consider in each of the steps are listed in the following.
Planning and design
In order to be able to use Bluetooth securely and effectively, a concept should be drawn up on the basis of the overall security strategy of the organisation and any requirements arising from the planned operational scenarios. Building upon this concept, the use of Bluetooth in the government agency and/or company must be controlled and a security policy must be drawn up (see S 2.461 Planning the secure use of Bluetooth).
Purchasing
When purchasing Bluetooth components, the requirements for the particular products resulting from the concept must be formulated and suitable products must be selected based on these requirements (see S 2.462 Selection criteria for the procurement of Bluetooth devices).
Implementation
Depending on the security requirements, the Bluetooth components must be configured in different ways (see S 4.362 Secure configuration of Bluetooth). The users and administrators must receive adequate training to minimise the number of security incidents and to point out and sensitise them to the possible threats of the improper use of Bluetooth components (see S 3.80 Raising awareness for the use of Bluetooth).
Operation
Bluetooth devices must be secured appropriately during operation (see S 4.363 Secure operation of Bluetooth devices).
Disposal
Once Bluetooth devices are taken out of operation, all sensitive information such as access data must be deleted (see S 4.364 Procedures regarding the disposal of Bluetooth devices).
In the following, the bundle of security safeguards for the use of Bluetooth is presented.
Planning and design
S 2.461 | (A) | Planning the secure use of Bluetooth |
S 3.79 | (W) | Introduction to basic terms and functional principles of Bluetooth |
Purchasing
S 2.462 | (Z) | Selection criteria for the procurement of Bluetooth devices |
Implementation
S 3.80 | (A) | Raising awareness for the use of Bluetooth |
S 4.362 | (A) | Secure configuration of Bluetooth |
Operation
S 2.463 | (Z) | Use of a central pool of Bluetooth peripheral devices |
S 4.363 | (A) | Secure operation of Bluetooth devices |
Disposal
S 4.364 | (A) | Procedures regarding the disposal of Bluetooth devices |