Skip to content

Ivanti MobileIron Sentry 9.x NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • MobileIron Sentry must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.

    <VulnDiscussion>This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead...
    Rule High Severity
  • SRG-APP-000515-NDM-000325

    <GroupDescription></GroupDescription>
    Group
  • MobileIron Sentry must off-load audit records onto a different system or media than the system being audited.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common ...
    Rule Low Severity
  • SRG-APP-000516-NDM-000335

    <GroupDescription></GroupDescription>
    Group
  • MobileIron Sentry must enforce access restrictions associated with changes to the system components.

    &lt;VulnDiscussion&gt;Changes to the hardware or software components of the network device can have significant effects on the overall security of ...
    Rule Low Severity
  • SRG-APP-000516-NDM-000340

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000516-NDM-000344

    <GroupDescription></GroupDescription>
    Group
  • MobileIron Sentry must obtain its public key certificates from an appropriate certificate policy through an approved service provider.

    &lt;VulnDiscussion&gt;For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB p...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000350

    <GroupDescription></GroupDescription>
    Group
  • MobileIron Sentry must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the ISSO.

    &lt;VulnDiscussion&gt;Without syslog enabled it will be difficult for an ISSO to correlate the users behavior and identify potential threats within...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules