S 2.462 Selection criteria for the procurement of Bluetooth devices

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: IT Security Officer, Head of IT

Bluetooth devices differ in the Bluetooth specifications used, in the available application profiles and in the way Bluetooth was implemented by the manufacturers. Therefore, individual criteria for the selection of Bluetooth devices need to be defined.

All devices that are vulnerable due to known Bluetooth vulnerabilities have to be excluded. Vulnerability lists containing the respective devices are available on the Internet.

In addition, the required application profiles for the respective purposes of the Bluetooth devices as well as the application profiles to be excluded or deactivated need to be specified. The Bluetooth devices contain the application profiles they require for their respective functions. For example, a Bluetooth mouse or keyboard always features the HID profile required for pointing devices (see S 3.79 Introduction to basic terms and functional principles of Bluetooth). It may be advantageous, however, if a mobile phone is not provided with a SIM Access Profile because this provides access to the SIM card of the mobile phone and is therefore a potential point of attack.

In any case, the selected end devices have to comply with Bluetooth specification 2.1 or higher as it contains important security functions, such as Secure Simple Pairing. Devices that are based on a Bluetooth specification that is older than version 2.1 must not be used as they feature weaker security mechanisms (see S 4.362 Secure configuration of Bluetooth).

The most important security criteria for the selection of Bluetooth devices are listed below:

Before buying Bluetooth components, you must make sure that they support all required profiles. If they do not support a profile such as Advanced Audio Distribution Profile (A2DP), it is not possible to transmit high quality audio data via Bluetooth, for example.