Skip to content

Unified Endpoint Management Server Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The UEM server must map the authenticated identity to the individual user or group account for PKI-based authentication.

    Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis. Satisf...
    Rule Medium Severity
  • SRG-APP-000178

    Group
  • SRG-APP-000179

    Group
  • The UEM server must use FIPS-validated SHA-2 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, and hash-only applications.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Nonlocal maintenance and diagnostic activities are activities conducted by individu...
    Rule High Severity
  • SRG-APP-000191

    Group
  • The UEM server must be configured to provide a trusted communication channel between itself and authorized IT entities using [selection: -IPsec, -SSH, -mutually authenticated TLS, -mutually authenticated DTLS, -HTTPS].

    Examples of authorized IT entities: audit server, Active Directory, software update server, and database server. Without confidentiality protection mechanisms, unauthorized individuals may gain ac...
    Rule Medium Severity
  • SRG-APP-000191

    Group
  • SRG-APP-000191

    Group
  • SRG-APP-000219

    Group
  • The UEM server must protect the authenticity of communications sessions.

    Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false information into sessions. Application communication sessions are protect...
    Rule Medium Severity
  • SRG-APP-000220

    Group
  • The UEM server must invalidate session identifiers upon user logout or other session termination.

    Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries from capturing and continuing to employ previously valid session IDs. This requirement focus...
    Rule Medium Severity
  • SRG-APP-000223

    Group
  • The UEM server must recognize only system-generated session identifiers.

    Applications utilize sessions and session identifiers to control application behavior and user access. If an attacker can guess the session identifier, or can inject or manually insert session info...
    Rule Medium Severity
  • SRG-APP-000224

    Group
  • SRG-APP-000225

    Group
  • The UEM server must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.

    Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized access to system resources. Applications or systems that fail suddenly and wi...
    Rule Medium Severity
  • SRG-APP-000226

    Group
  • SRG-APP-000251

    Group
  • The UEM server must check the validity of all data inputs.

    Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application is unprepared to process that data. This results in unanticipated applic...
    Rule Medium Severity
  • SRG-APP-000266

    Group
  • SRG-APP-000267

    Group
  • The UEM server must reveal error messages only to the Information System Security Manager (ISSM) and Information System Security Officer (ISSO).

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the application. Additional...
    Rule Medium Severity
  • SRG-APP-000275

    Group
  • The application must notify the Information System Security Manager (ISSM) and Information System Security Officer (ISSO) of failed security verification tests.

    If personnel are not notified of failed security verification tests, they will not be able to take corrective action and the unsecure condition(s) will remain. Security function is defined as the...
    Rule Medium Severity
  • SRG-APP-000291

    Group
  • The UEM server must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are created.

    Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simply ...
    Rule Medium Severity
  • SRG-APP-000292

    Group
  • SRG-APP-000293

    Group
  • The UEM server must notify system administrators (SAs) and the information system security officer (ISSO) for account disabling actions.

    When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes themselves. Sending notif...
    Rule Medium Severity
  • SRG-APP-000294

    Group
  • SRG-APP-000295

    Group
  • The UEM server must automatically terminate a user session after an organization-defined period of user inactivity.

    Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i....
    Rule Medium Severity
  • SRG-APP-000296

    Group
  • SRG-APP-000297

    Group
  • The UEM server must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.

    If a user cannot explicitly end an application session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Users need to be aware of whether or no...
    Rule Medium Severity
  • SRG-APP-000319

    Group
  • SRG-APP-000320

    Group
  • The UEM server must notify system administrator (SA) and information system security officer (ISSO) of account enabling actions.

    Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simply ...
    Rule Medium Severity
  • SRG-APP-000329

    Group
  • SRG-APP-000343

    Group
  • The UEM server must audit the execution of privileged functions.

    Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...
    Rule Medium Severity
  • SRG-APP-000345

    Group
  • The UEM server must automatically lock the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.

    By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the a...
    Rule Medium Severity
  • SRG-APP-000358

    Group
  • SRG-APP-000374

    Group
  • The UEM server must be configured to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Tim...
    Rule Medium Severity
  • SRG-APP-000375

    Group
  • The UEM server must be configured to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.

    Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records. Time stamps generated by the application include date and time. Granu...
    Rule Medium Severity
  • SRG-APP-000378

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules