Skip to content

Unified Endpoint Management Server Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The UEM server must prohibit user installation of software by an administrator without the appropriate assigned permission for software installation.

    <VulnDiscussion>Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...
    Rule Medium Severity
  • SRG-APP-000378

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must enforce access restrictions associated with changes to the server configuration.

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to application configuration may have significant effe...
    Rule Medium Severity
  • SRG-APP-000381

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must audit the enforcement actions used to restrict access associated with changes to the application.

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficul...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must disable organization-defined functions, ports, protocols, and services (within the application) deemed unnecessary and/or non-secure.

    &lt;VulnDiscussion&gt;Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of unauthorized connection of d...
    Rule Medium Severity
  • SRG-APP-000389

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must require users (administrators) to reauthenticate when roles change.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When applic...
    Rule Medium Severity
  • SRG-APP-000390

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must require end-point devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication.

    &lt;VulnDiscussion&gt;This requirement refers to the end-point device user reauthenticating to the device. The following are examples of organizat...
    Rule Medium Severity
  • Before establishing a connection to any endpoint device being managed, the UEM server must establish a trusted path between the server and endpoint that provides assured identification of the end point using a bidirectional authentication mechanism configured with a FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to authenticate with the device.

    &lt;VulnDiscussion&gt;Without device-to-device authentication, communications with malicious devices may be established. Bidirectional authenticati...
    Rule High Severity
  • SRG-APP-000400

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must prohibit the use of cached authenticators after an organization-defined time period.

    &lt;VulnDiscussion&gt;If cached authentication information is out-of-date, the validity of the authentication information may be questionable. Acc...
    Rule Medium Severity
  • SRG-APP-000401

    <GroupDescription></GroupDescription>
    Group
  • The UEM server, for PKI-based authentication, must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.

    &lt;VulnDiscussion&gt;Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer autho...
    Rule Medium Severity
  • SRG-APP-000412

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must configure web management tools with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-APP-000413

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must verify remote disconnection when non-local maintenance and diagnostic sessions are terminated.

    &lt;VulnDiscussion&gt;If the remote connection is not closed and verified as closed, the session may remain open and be exploited by an attacker; t...
    Rule Medium Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must generate audit records when successful/unsuccessful attempts to delete privileges occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • The UEM server must only allow the use of DoD PKI established certificate authorities for verification of the establishment of protected sessions.

    &lt;VulnDiscussion&gt;Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to use X.509v3 certificates for code signing for system software updates.

    &lt;VulnDiscussion&gt;It is critical that the UEM server validate code signing certificates for key activities such as code signing for system soft...
    Rule Medium Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to use X.509v3 certificates for code signing for integrity verification.

    &lt;VulnDiscussion&gt;It is critical that the UEM server validate code signing certificates for key activities such as code signing for system soft...
    Rule Medium Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must connect to [assignment: [list of applications]] and managed mobile devices with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;Applications may include the following: update server, database, and enterprise directory service. Without protection of the ...
    Rule High Severity
  • SRG-APP-000447

    <GroupDescription></GroupDescription>
    Group
  • SRG-APP-000501

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to write to the server event log when invalid inputs are received.

    &lt;VulnDiscussion&gt;A common vulnerability of applications is unpredictable behavior when invalid inputs are received. This requirement guards ag...
    Rule Medium Severity
  • SRG-APP-000454

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must remove old software components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of software components that are not removed from the information system after updates have been installed m...
    Rule Medium Severity
  • SRG-APP-000456

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be maintained at a supported version.

    &lt;VulnDiscussion&gt;The UEM vendor maintains specific product versions for a specific period of time. MDM/EMM server versions no longer supported...
    Rule High Severity
  • SRG-APP-000472

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured with the periodicity of the following commands to the agent of six hours or less: - query connectivity status - query the current version of the managed device firmware/software - query the current version of installed mobile applications - read audit logs kept by the managed device.

    &lt;VulnDiscussion&gt;Without verification, security functions may not operate correctly and this failure may go unnoticed. Security function is ...
    Rule Medium Severity
  • SRG-APP-000473

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must run a suite of self-tests during initial start-up (power on) to demonstrate correct operation of the server.

    &lt;VulnDiscussion&gt;Without verification, security functions may not operate correctly and this failure may go unnoticed. Security function is ...
    Rule Medium Severity
  • SRG-APP-000474

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must alert the system administrator when anomalies in the operation of security functions are discovered.

    &lt;VulnDiscussion&gt;If anomalies are not acted upon, security functions may fail to secure the system. Security function is defined as the hard...
    Rule Medium Severity
  • SRG-APP-000479

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to verify software updates to the server using a digital signature mechanism prior to installing those updates.

    &lt;VulnDiscussion&gt;Unauthorized modifications to software or firmware may be indicative of a sophisticated, targeted cyber-attack. Cryptographic...
    Rule Medium Severity
  • SRG-APP-000492

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must generate audit records when successful/unsuccessful attempts to access security objects occur.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-APP-000495

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must generate audit records when successful/unsuccessful attempts to modify privileges occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-APP-000496

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must generate audit records when successful/unsuccessful attempts to modify security objects occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules