Fluid Attacks logo
Login
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO

REQ.206 Configure communication protocols

This document details the security requirements related to the management of communication protocols used by mobile devices in data transfer. This requirement recommends that communication protocols remain hidden, configured with credentials or turned off.

Requirement

The system must keep mobile devices' communication protocols hidden, protected with credentials or turned off. This refers to protocols that allow data exchange such as Bluetooth, NFC and Tethering.


Service status - Terms of Use