S 4.364 Procedures regarding the disposal of Bluetooth devices

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

When Bluetooth components must be taken out of operation, all sensitive information must be deleted. In particular, the authentication information used to access Bluetooth networks and other accessible resources stored in the security infrastructure and other systems must be deleted and/or declared invalid. This means that cryptographic keys must be securely deleted and certificates for digital signatures must be blocked, for example.

A variety of devices are used as Bluetooth devices. These devices include, amongst others:

The Bluetooth functionality is typically one of a number of various other functions on these terminal devices. When taking these terminal devices out of operation, such devices must therefore be examined to determine if they contain Bluetooth information critical to security that needs to be deleted, transferred, and/or archived, e.g.:

Suitable methods must be used to destroy, delete, or reuse the security-relevant information depending on the device and the storage method. For certificates, for example, an entry must be made in the corresponding certificate revocation list (CRL) to revoke the certificate.

If a Bluetooth device is stolen, at least all information mentioned above must be taken into account and it must be ensured that these terminal devices are no longer granted access to remaining Bluetooth devices or network structures. The best way to achieve this is to delete the pairing information about the stolen terminal devices from the remaining terminal devices.

Review questions: