I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000501
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when successful/unsuccessful attempts to delete security objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000503
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when successful/unsuccessful logon attempts occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000504
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records for privileged activities or other system-level access.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000505
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records showing starting and ending time for user access to the system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000506
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when concurrent logons from different workstations occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000507
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when successful/unsuccessful accesses to objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000508
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records for all direct access to the information system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000509
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
The UEM server must use a FIPS-validated cryptographic module to generate cryptographic hashes.
<VulnDiscussion>FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...Rule High Severity -
SRG-APP-000515
<GroupDescription></GroupDescription>Group -
The UEM server must, at a minimum, off-load audit logs of interconnected systems in real time and off-load standalone systems weekly.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The UEM server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
<VulnDiscussion>Configuring the application to implement organization-wide security implementation guides and security checklists ensures com...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to allow authorized administrators to read all audit data from audit records on the server.
<VulnDiscussion>Successful incident response and auditing relies on timely, accurate system information and analysis in order to allow the or...Rule Medium Severity -
SRG-APP-000555
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to implement FIPS 140-2 mode for all server and agent encryption.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-APP-000560
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0.
<VulnDiscussion>Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...Rule Medium Severity -
SRG-APP-000580
<GroupDescription></GroupDescription>Group -
The UEM server must authenticate endpoint devices (servers) before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...Rule Medium Severity -
SRG-APP-000585
<GroupDescription></GroupDescription>Group -
If cipher suites using pre-shared keys are used for device authentication, the UEM server must have a minimum security strength of 112 bits or higher.
<VulnDiscussion>Pre-shared keys are symmetric keys that are already in place prior to the initiation of a Transport Layer Security (TLS) sess...Rule Medium Severity -
SRG-APP-000605
<GroupDescription></GroupDescription>Group -
The UEM server must validate certificates used for Transport Layer Security (TLS) functions by performing RFC 5280-compliant certification path validation.
<VulnDiscussion>A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...Rule Medium Severity -
SRG-APP-000610
<GroupDescription></GroupDescription>Group -
The application must use FIPS-validated SHA-256 or higher hash function for digital signature generation and verification.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Note: Altho...Rule High Severity -
SRG-APP-000427
<GroupDescription></GroupDescription>Group -
The UEM Server must provide digitally signed policy updates to UEM Agent.
<VulnDiscussion>It is critical that the UEM server sign all policy updates with validated certificates. Otherwise, there is no assurance that...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.