S 4.363 Secure operation of Bluetooth devices

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator, User

Bluetooth devices must be secured appropriately. The safeguards to be taken are described in the following.

Stationary devices

Stationary devices where Bluetooth is used as a substitute for a cable, e.g. in order to establish a connection to the same peripheral devices over and over again, should be operated with an authentication method. Here, solutions with semi-permanent connection keys should be preferred. As a matter of principle, encryption should be enabled.

Mobile devices

Mobile Bluetooth devices communicating with third party devices (i.e. with devices having an unknown level of security) must be protected in particular:

If a mobile (and/or stationary) device is lost or stolen, all related connection keys in the remaining devices must be deleted. This is generally performed by deleting the corresponding entry in the list of Bluetooth devices of the remaining devices.

Use of Secure Simple Pairing

If both devices to be connected at least meet the Bluetooth specification 2.1 + EDR, Secure Simple Pairing should be used with security mode 4 and the attribute "authenticated" (see S 3.79 Introduction to basic terms and functional principle of Bluetooth). Services where this is not supported should not be used.

Notes on the selection of PINs for Bluetooth without SSP

PINs should be a sequence of the admissible characters that is as random as possible; trivial PINs such as "0000" or "1234" must be avoided. A sufficiently long PIN is required in order to reach sufficient levels of security when connecting two Bluetooth devices. PINs should have at least 6 digits. Normally, the PIN must only be entered when initially establishing a connection between devices (semi-permanent connection keys). If such a pair of devices requests the user to enter a PIN at an unexpected time, the user should not enter any PIN, if possible, until he/she has entered a tap-proof environment. It is recommendable to conduct corresponding user instruction or training.

Additional protection safeguards

As long as Bluetooth is not used, the Bluetooth interfaces of the devices should remain disabled. Whether this actually is the case must be checked sporadically. Furthermore, additional local protection safeguards should be installed and/or enabled on Bluetooth devices to the technically feasible extent. These include:

It should be checked at regular intervals that all security settings performed are still up to date and whether these settings are efficient.

Additional information about this can be found in the modules for terminal device security. If there are any doubts, users should use module S 3.8 Internet PC as a reference and apply the related safeguards correspondingly.

Review questions: