Unified Endpoint Management Server Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The UEM server must invalidate session identifiers upon user logout or other session termination.
<VulnDiscussion>Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries from capturing and co...Rule Medium Severity -
SRG-APP-000223
<GroupDescription></GroupDescription>Group -
The UEM server must recognize only system-generated session identifiers.
<VulnDiscussion>Applications utilize sessions and session identifiers to control application behavior and user access. If an attacker can gue...Rule Medium Severity -
SRG-APP-000224
<GroupDescription></GroupDescription>Group -
The UEM server must generate unique session identifiers using a FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm.
<VulnDiscussion>Sequentially generated session IDs can be easily guessed by an attacker. Employing the concept of randomness in the generatio...Rule High Severity -
SRG-APP-000225
<GroupDescription></GroupDescription>Group -
SRG-APP-000319
<GroupDescription></GroupDescription>Group -
The UEM server must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
<VulnDiscussion>Failure to a known safe state helps prevent systems from failing to a state that may cause loss of data or unauthorized acces...Rule Medium Severity -
SRG-APP-000226
<GroupDescription></GroupDescription>Group -
In the event of a system failure, the UEM server must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
<VulnDiscussion>Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...Rule Medium Severity -
SRG-APP-000251
<GroupDescription></GroupDescription>Group -
The UEM server must check the validity of all data inputs.
<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...Rule Medium Severity -
SRG-APP-000266
<GroupDescription></GroupDescription>Group -
The UEM server must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
<VulnDiscussion>Any application providing too much information in error messages risks compromising the data and security of the application ...Rule Medium Severity -
SRG-APP-000267
<GroupDescription></GroupDescription>Group -
The UEM server must, when a component failure is detected, activate an organization-defined alarm and/or automatically shut down the application or the component.
<VulnDiscussion>Predictable failure prevention requires organizational planning to address system failure issues. If components key to mainta...Rule Medium Severity -
SRG-APP-000275
<GroupDescription></GroupDescription>Group -
The application must notify the Information System Security Manager (ISSM) and Information System Security Officer (ISSO) of failed security verification tests.
<VulnDiscussion>If personnel are not notified of failed security verification tests, they will not be able to take corrective action and the ...Rule Medium Severity -
SRG-APP-000291
<GroupDescription></GroupDescription>Group -
The UEM server must notify system administrators and the Information System Security Officer (ISSO) when accounts are created.
<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...Rule Medium Severity -
SRG-APP-000292
<GroupDescription></GroupDescription>Group -
The UEM server must notify system administrators and the Information System Security Officer (ISSO) when accounts are modified.
<VulnDiscussion>When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual user...Rule Medium Severity -
SRG-APP-000293
<GroupDescription></GroupDescription>Group -
The UEM server must notify system administrators and the Information System Security Officer (ISSO) for account disabling actions.
<VulnDiscussion>When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual user...Rule Medium Severity -
SRG-APP-000294
<GroupDescription></GroupDescription>Group -
The UEM server must notify system administrators and the Information System Security Officer (ISSO) for account removal actions.
<VulnDiscussion>When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for ide...Rule Medium Severity -
SRG-APP-000295
<GroupDescription></GroupDescription>Group -
The UEM server must automatically terminate a user session after an organization-defined period of user inactivity.
<VulnDiscussion>Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...Rule Medium Severity -
SRG-APP-000296
<GroupDescription></GroupDescription>Group -
The UEM server must provide logout capability for user-initiated communication sessions.
<VulnDiscussion>If a user cannot explicitly end an application session, the session may remain open and be exploited by an attacker; this is ...Rule Medium Severity -
SRG-APP-000297
<GroupDescription></GroupDescription>Group -
The UEM server must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
<VulnDiscussion>If a user cannot explicitly end an application session, the session may remain open and be exploited by an attacker; this is ...Rule Medium Severity -
The UEM server must automatically audit account-enabling actions.
<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...Rule Medium Severity -
SRG-APP-000320
<GroupDescription></GroupDescription>Group -
The UEM server must notify system administrator and Information System Security Officer (ISSO) of account enabling actions.
<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...Rule Medium Severity -
SRG-APP-000327
<GroupDescription></GroupDescription>Group -
The UEM server must employ an audited override of automated access control mechanisms under organization-defined conditions.
<VulnDiscussion>Successful incident response and auditing relies on timely, accurate system information and analysis in order to allow the or...Rule Medium Severity -
SRG-APP-000329
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to have at least one user in defined administrator roles.
<VulnDiscussion>Having several administrative roles for the UEM server supports separation of duties. This allows administrator-level privile...Rule Medium Severity -
SRG-APP-000343
<GroupDescription></GroupDescription>Group -
The UEM server must audit the execution of privileged functions.
<VulnDiscussion>Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external enti...Rule Medium Severity -
SRG-APP-000345
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to transfer UEM server logs to another server for storage, analysis, and reporting. Note: UEM server logs include logs of UEM events and logs transferred to the UEM server by UEM agents of managed devices.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-APP-000374
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Medium Severity -
SRG-APP-000375
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
<VulnDiscussion>Without sufficient granularity of time stamps, it is not possible to adequately determine the chronological order of records....Rule Medium Severity -
SRG-APP-000377
<GroupDescription></GroupDescription>Group -
The UEM server must verify the digital signature of software before installation and alert the Information System Security Officer (ISSO), Information System Security Manager (ISSM), and other designated personnel if unauthorized software is detected.
<VulnDiscussion>Unauthorized software not only increases risk by increasing the number of potential vulnerabilities, it also can contain mali...Rule Medium Severity -
SRG-APP-000378
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.