Ivanti MobileIron Sentry 9.x ALG Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000166-ALG-000101
<GroupDescription></GroupDescription>Group -
The Sentry providing PKI-based mobile device authentication intermediary services must map authenticated identities to the mobile device account.
<VulnDiscussion>Authorization for access to any network element requires an approved and assigned individual account identifier. To ensure on...Rule Medium Severity -
SRG-NET-000213-ALG-000107
<GroupDescription></GroupDescription>Group -
The Sentry must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for mobile device sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule Medium Severity -
SRG-NET-000334-ALG-000050
<GroupDescription></GroupDescription>Group -
The Sentry must offload audit records onto a centralized log server.
<VulnDiscussion>Without the capability to select a user session to capture or view, investigations into suspicious or harmful events would be...Rule Low Severity -
SRG-NET-000339-ALG-000090
<GroupDescription></GroupDescription>Group -
The Sentry providing mobile device authentication intermediary services must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
<VulnDiscussion>For remote access to non-privileged accounts, the purpose of requiring a device that is separate from the information system ...Rule Medium Severity -
SRG-NET-000355-ALG-000117
<GroupDescription></GroupDescription>Group -
The Sentry providing mobile device authentication intermediary services using PKI-based mobile device authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of protected sessions.
<VulnDiscussion>Non-DoD-approved PKIs have not been evaluated to ensure they have security controls and identity vetting procedures in place ...Rule Medium Severity -
SRG-NET-000362-ALG-000120
<GroupDescription></GroupDescription>Group -
The Sentry must implement load balancing to limit the effects of known and unknown types of Denial-of-Service (DoS) attacks.
<VulnDiscussion>If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Load balancin...Rule Low Severity -
SRG-NET-000364-ALG-000122
<GroupDescription></GroupDescription>Group -
The Sentry must only allow incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
<VulnDiscussion>Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additio...Rule Medium Severity -
SRG-NET-000402-ALG-000130
<GroupDescription></GroupDescription>Group -
The Sentry must reveal error messages only to the ISSO, ISSM, and SCA.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Low Severity -
SRG-NET-000510-ALG-000025
<GroupDescription></GroupDescription>Group -
The Sentry providing encryption intermediary services must implement NIST FIPS-validated cryptography to generate cryptographic hashes.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...Rule Medium Severity -
SRG-NET-000510-ALG-000040
<GroupDescription></GroupDescription>Group -
The Sentry providing encryption intermediary services must implement NIST FIPS-validated cryptography for digital signatures.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.