Skip to content

ISEC7 EMM Suite v6.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The ISEC7 EMM Suite must accept Personal Identity Verification (PIV) credentials.

    <VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Low Severity
  • SRG-APP-000395

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000148

    <GroupDescription></GroupDescription>
    Group
  • ISEC7 EMM Suite must disable or delete local account created during application installation and configuration.

    &lt;VulnDiscussion&gt;The ISEC7 local account password complexity controls do not meet DoD requirements; therefore, admins have the capability to c...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The ISEC7 EMM Suite must be configured to leverage the enterprise directory service accounts and groups for ISEC7 EMM Suite server admin identification and authentication.

    &lt;VulnDiscussion&gt;A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring atte...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The ISEC7 EMM Suite must configure the timeout for the console to be 15 minutes or less.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user (MDM system administrator) stops work and moves away from the...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The ISEC7 EMM Suite, Tomcat installation, and ISEC7 Suite monitor must be configured to use the Windows Trust Store for the storage of digital certificates and keys.

    &lt;VulnDiscussion&gt;A trust store provides requisite encryption and access control to protect digital certificates from unauthorized access.&lt;/...
    Rule Medium Severity
  • SRG-APP-000171

    <GroupDescription></GroupDescription>
    Group
  • The Apache Tomcat Manager Web app password must be cryptographically hashed with a DoD approved algorithm.

    &lt;VulnDiscussion&gt;The Apache Tomcat Manager Web app password is stored in plain text in CATALINA_HOME/conf/tomcat-users.xml and should be encry...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • All Web applications included with Apache Tomcat that are not required must be removed.

    &lt;VulnDiscussion&gt;Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of unauthorized connection of d...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • LockOutRealm must not be removed from Apache Tomcat.

    &lt;VulnDiscussion&gt;LockOutRealm prevents brute force attacks against user passwords. Removal of unneeded or non-secure functions, ports, protoco...
    Rule Medium Severity
  • SRG-APP-000065

    <GroupDescription></GroupDescription>
    Group
  • The LockOutRealm must be configured with a login failure count of 3.

    &lt;VulnDiscussion&gt;LockOutRealm prevents brute force attacks against user passwords. Removal of unneeded or non-secure functions, ports, protoco...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The LockOutRealm must be configured with a login lockout time of 15 minutes.

    &lt;VulnDiscussion&gt;LockOutRealm prevents brute force attacks against user passwords. Removal of unneeded or non-secure functions, ports, protoco...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules