Skip to content

Jamf Pro v10.x EMM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • PP-MDM-411047

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM server or platform must be configured to initiate a session lock after a 15-minute period of inactivity.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user (MDM system administrator) stops work and moves away from the...
    Rule Medium Severity
  • PP-MDM-411051

    <GroupDescription></GroupDescription>
    Group
  • The MySQL DatabasePassword key must be removed or set to a blank value in the database configuration file in Jamf Pro EMM.

    &lt;VulnDiscussion&gt;If the database password is not removed or set to a blank value in the configuration file, the user is not forced to enter th...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM local accounts must be configured with password minimum lifetime of 24 hours.

    &lt;VulnDiscussion&gt;Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforce...
    Rule Medium Severity
  • The Jamf Pro EMM server must be configured with an enterprise certificate for signing policies (if function is not automatically implemented during Jamf Pro EMM server install).

    &lt;VulnDiscussion&gt;It is critical that only authorized certificates are used for key activities such as code signing for system software updates...
    Rule Medium Severity
  • PP-MDM-411054

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM server must be configured to transfer Jamf Pro EMM server logs to another server for storage, analysis, and reporting. Note: Jamf Pro EMM server logs include logs of MDM events and logs transferred to the Jamf Pro EMM server by MDM agents of managed devices.

    &lt;VulnDiscussion&gt;Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. Since the Jamf Pro EMM...
    Rule Medium Severity
  • PP-MDM-411056

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM server must be configured to display the required DoD warning banner upon administrator logon. Note: This requirement is not applicable if the TOE platform is selected in FTA_TAB.1.1 in the Security Target (ST).

    &lt;VulnDiscussion&gt;Note: The advisory notice and consent warning message is not required if the general purpose OS or network device displays an...
    Rule Low Severity
  • PP-MDM-411058

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM server must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, auditor.

    &lt;VulnDiscussion&gt;Having several administrative roles for the Jamf Pro EMM server supports separation of duties. This allows administrator-leve...
    Rule Medium Severity
  • PP-MDM-414002

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM server must be configured to leverage the MDM platform user accounts and groups for Jamf Pro EMM server user identification and CAC authentication.

    &lt;VulnDiscussion&gt;A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring atte...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • Authentication of Jamf Pro EMM server accounts must be configured so they are implemented either via an Authentication Gateway Service (AGS) which connects to the site DoD Identity Access Management (IdAM) environment that utilizes CAC authentication or via strong password controls for the administrator local accounts.

    &lt;VulnDiscussion&gt;A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring atte...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • Jamf Pro EMM must be maintained at a supported version.

    &lt;VulnDiscussion&gt;The MDM/EMM vendor maintains specific product versions for a specific period of time. MDM/EMM server versions no longer suppo...
    Rule High Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • The default mysql_secure_installation must be installed.

    &lt;VulnDiscussion&gt;The mysql_secure_installation configuration of MySQL adds several important configuration settings that block several attack ...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • A unique database name and a unique MySQL user with a secure password must be created for use in Jamf Pro EMM.

    &lt;VulnDiscussion&gt;If the default MySQL database name and password are not changed an adversary could gain unauthorized access to the applicatio...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • Separate MySQL user accounts with limited privileges must be created within Jamf Pro EMM.

    &lt;VulnDiscussion&gt;If separate MySQL accounts with limited privileges are not created an adversary could gain unauthorized access to the applica...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • MySQL database backups must be scheduled in Jamf Pro EMM.

    &lt;VulnDiscussion&gt;Database backups are a recognized best practice to protect against key data loss and possible adverse impacts to the mission ...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • PP-MDM-431005

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM local accounts password must be configured with length of 15 characters.

    &lt;VulnDiscussion&gt;The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM local accounts must be configured with at least one lowercase character.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM local accounts must be configured with at least one uppercase character.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM local accounts must be configured with at least one number.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM local accounts must be configured with at least one special character.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM local accounts must be configured with password maximum lifetime of 3 months.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM local accounts must prohibit password reuse for a minimum of five generations.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM must automatically disable accounts after a 35 day period of account inactivity (local accounts).

    &lt;VulnDiscussion&gt;Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an applicatio...
    Rule Medium Severity
  • PP-MDM-991000

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM must enforce the limit of three consecutive invalid logon attempts by a user.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • PP-MDM-431004

    <GroupDescription></GroupDescription>
    Group
  • The Jamf Pro EMM server platform must be protected by a DoD-approved firewall.

    &lt;VulnDiscussion&gt;Most information systems are capable of providing a wide variety of functions and services. Some of the functions and service...
    Rule Medium Severity
  • The firewall protecting the Jamf Pro EMM server platform must be configured to restrict all network traffic to and from all addresses with the exception of ports, protocols, and IP address ranges required to support Jamf Pro EMM server and platform functions.

    &lt;VulnDiscussion&gt;Most information systems are capable of providing a wide variety of functions and services. Some of the functions and service...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules