ISEC7 EMM Suite v6.x Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The ISEC7 EMM Suite must be configured to leverage the enterprise directory service accounts and groups for ISEC7 EMM Suite server admin identification and authentication.
A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring attention are consistently and promptly addressed. If an attacker compromise...Rule Medium Severity -
All Web applications included with Apache Tomcat that are not required must be removed.
Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of unauthorized connection of devices, unauthorized transfer of information, or other exploitation of t...Rule Medium Severity -
The ISEC7 EMM Suite must configure Enable HTTPS to use HTTP over SSL in Apache Tomcat.
Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requiremen...Rule Medium Severity -
The version number of Apache Tomcat must be removed from the CATALINA_HOME/lib/catalina.jar file.
If the version number of Apache Tomcat were visible to an intruder, they could use that information to search for known vulnerabilities of the app. Removal of unneeded or non-secure functions, port...Rule Medium Severity -
SSL must be enabled on Apache Tomcat.
Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requiremen...Rule Medium Severity -
The ISEC7 EMM Suite must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during electronic dissemination using remote access.
Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that exploit vulnerabilities in this protocol. This requ...Rule Medium Severity -
The ISEC7 EMM Suite must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the ISEC7 EMM Suite.
Display of the DoD-approved use notification before granting access to the application ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive ...Rule Medium Severity -
The ISEC7 EMM Suite must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...Rule Medium Severity -
Before establishing a local, remote, and/or network connection with any endpoint device, the ISEC7 EMM Suite must use a bidirectional authentication mechanism configured with a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the device.
Without device-to-device authentication, communications with malicious devices may be established. Bidirectional authentication provides stronger safeguards to validate the identity of other device...Rule Medium Severity -
The ISEC7 EMM Suite must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. To protect the integrity of the authenticator and authentication mechanism used for...Rule Medium Severity -
The ISEC7 EMM Suite must back up audit records at least every seven days onto a different system or system component than the system or component being audited, provide centralized management and configuration of the content to be captured in audit records generated by all ISEC7 EMM Suite components, and off-load audit records onto a different system or media than the system being audited.
Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a different system or onto separate media than the system being audited on an orga...Rule Medium Severity -
The Manager Web app password must be configured as follows: -15 or more characters -at least one lower case letter -at least one upper case letter -at least one number -at least one special character
The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...Rule Medium Severity -
The ISEC7 EMM Suite must accept Personal Identity Verification (PIV) credentials.
The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use of the CAC to support identity management and personal authentication f...Rule Low Severity -
SRG-APP-000395
Group -
SRG-APP-000148
Group -
ISEC7 EMM Suite must disable or delete local account created during application installation and configuration.
The ISEC7 local account password complexity controls do not meet DoD requirements; therefore, admins have the capability to configure the account out of compliance, which could allow attacker to ga...Rule High Severity -
SRG-APP-000516
Group -
SRG-APP-000516
Group -
The ISEC7 EMM Suite must configure the timeout for the console to be 15 minutes or less.
A session time-out lock is a temporary action taken when a user (MDM system administrator) stops work and moves away from the immediate physical vicinity of the information system but does not log ...Rule Medium Severity -
SRG-APP-000516
Group -
The ISEC7 EMM Suite, Tomcat installation, and ISEC7 Suite monitor must be configured to use the Windows Trust Store for the storage of digital certificates and keys.
A trust store provides requisite encryption and access control to protect digital certificates from unauthorized access.Rule Medium Severity -
SRG-APP-000171
Group -
The Apache Tomcat Manager Web app password must be cryptographically hashed with a DoD approved algorithm.
The Apache Tomcat Manager Web app password is stored in plain text in CATALINA_HOME/conf/tomcat-users.xml and should be encrypted so it is not visible to an intruder. Passwords need to be protect...Rule Medium Severity -
SRG-APP-000383
Group -
SRG-APP-000383
Group -
LockOutRealm must not be removed from Apache Tomcat.
LockOutRealm prevents brute force attacks against user passwords. Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of unauthorized connection of devices...Rule Medium Severity -
SRG-APP-000065
Group -
The LockOutRealm must be configured with a login failure count of 3.
LockOutRealm prevents brute force attacks against user passwords. Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of unauthorized connection of devices...Rule Medium Severity -
SRG-APP-000516
Group -
The LockOutRealm must be configured with a login lockout time of 15 minutes.
LockOutRealm prevents brute force attacks against user passwords. Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of unauthorized connection of devices...Rule Medium Severity -
SRG-APP-000439
Group -
SRG-APP-000383
Group -
SRG-APP-000383
Group -
Stack tracing must be disabled in Apache Tomcat.
The default error page shows a full stack trace, which is a disclosure of sensitive information. Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of una...Rule Medium Severity -
SRG-APP-000380
Group -
The Apache Tomcat shutdown port must be disabled.
Tomcat uses a port (defaults to 8005) as a shutdown port. Someone could Telnet to the machine using this port and send the default command SHUTDOWN. Tomcat and all web apps would shut down in that ...Rule Medium Severity -
SRG-APP-000380
Group -
The ISEC7 EMM Suite must remove any unnecessaryusers or groups that have permissions to the server.xml file in Apache Tomcat.
Tomcat uses a port (defaults to 8005) as a shutdown port. Someone could Telnet to the machine using this port and send the default command SHUTDOWN. Tomcat and all web apps would shut down in that ...Rule Medium Severity -
SRG-APP-000090
Group -
A manager role must be assigned to the Apache Tomcat Web apps (Manager, Host-Manager).
If a manager role is not assigned to the Apache Tomcat web apps, the system administrator will not be able to manage and configure the web apps and security setting may not be configured correctly,...Rule Medium Severity -
SRG-APP-000439
Group -
SRG-APP-000068
Group -
SRG-APP-000439
Group -
Tomcat SSL must be restricted except for ISEC7 EMM Suite tasks.
Restricting the use of SSL helps ensure only authorized users and processes have access to Tomcat Web apps and reduces the attack surface of the ISEC7 EMM Suite. Without protection of the transmitt...Rule Medium Severity -
SRG-APP-000001
Group -
The ISEC7 EMM Suite must limit the number of concurrent sessions to an organization-defined number for all accounts and/or account types.
Application management includes the ability to control the number of users and user sessions that utilize an application. Limiting the number of allowed users and sessions per user is helpful in li...Rule Medium Severity -
SRG-APP-000003
Group -
The ISEC7 EMM Suite must initiate a session lock after a 15-minute period of inactivity.
A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system, but does not log out because of the tempora...Rule Medium Severity -
SRG-APP-000014
Group -
SRG-APP-000090
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.