I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000096
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to produce audit records containing information to establish when (date and time) the events occurred.
<VulnDiscussion>Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to a...Rule Medium Severity -
SRG-APP-000097
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to produce audit records containing information to establish where the events occurred.
<VulnDiscussion>Failure to generate these audit records makes it more difficult to identify or investigate attempted or successful compromise...Rule Medium Severity -
SRG-APP-000098
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to produce audit records containing information to establish the source of the events.
<VulnDiscussion>Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up...Rule Medium Severity -
SRG-APP-000099
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to produce audit records that contain information to establish the outcome of the events.
<VulnDiscussion>Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attac...Rule Medium Severity -
SRG-APP-000100
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to generate audit records containing information that establishes the identity of any individual or process associated with the event.
<VulnDiscussion>Without information that establishes the identity of the subjects (i.e., users or processes acting on behalf of users) associ...Rule Medium Severity -
SRG-APP-000101
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to generate audit records containing the full-text recording of privileged commands or the individual identities of group account users.
<VulnDiscussion>Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. O...Rule Medium Severity -
SRG-APP-000108
<GroupDescription></GroupDescription>Group -
The UEM SRG must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-APP-000116
<GroupDescription></GroupDescription>Group -
The UEM server must use host operating system clocks to generate time stamps for audit records.
<VulnDiscussion>Without an internal clock used as the reference for the time stored on each event to provide a trusted common reference for t...Rule Medium Severity -
SRG-APP-000118
<GroupDescription></GroupDescription>Group -
The UEM server must protect audit information from any type of unauthorized read access.
<VulnDiscussion>If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially ma...Rule Medium Severity -
SRG-APP-000119
<GroupDescription></GroupDescription>Group -
The UEM server must protect audit information from unauthorized modification.
<VulnDiscussion>If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...Rule Medium Severity -
SRG-APP-000120
<GroupDescription></GroupDescription>Group -
The UEM server must protect audit information from unauthorized deletion.
<VulnDiscussion>If audit data were to become compromised, then forensic analysis and discovery of the true source of potentially malicious sy...Rule Medium Severity -
SRG-APP-000125
<GroupDescription></GroupDescription>Group -
The UEM server must back up audit records at least every seven days onto a log management server.
<VulnDiscussion>Protection of log data includes ensuring log data is not accidentally lost or deleted. Backing up audit records to a differen...Rule Medium Severity -
SRG-APP-000131
<GroupDescription></GroupDescription>Group -
The UEM server must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the application. Verifying softwar...Rule Medium Severity -
SRG-APP-000133
<GroupDescription></GroupDescription>Group -
The UEM server must limit privileges to change the software resident within software libraries.
<VulnDiscussion>If the application were to allow any user to make changes to software libraries, then those changes might be implemented with...Rule Medium Severity -
SRG-APP-000141
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to disable non-essential capabilities.
<VulnDiscussion>It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objecti...Rule Medium Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
The firewall protecting the UEM server platform must be configured so only DoD-approved ports, protocols, and services are enabled. (See the DoD Ports, Protocols, Services Management [PPSM] Category Assurance Levels [CAL] list for DoD-approved ports, protocols, and services).
<VulnDiscussion>All ports, protocols, and services used on DoD networks must be approved and registered via the DoD PPSM process. This is to ...Rule Medium Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to use only documented platform APIs.
<VulnDiscussion>Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...Rule Medium Severity -
SRG-APP-000148
<GroupDescription></GroupDescription>Group -
The UEM server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
<VulnDiscussion>To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...Rule Medium Severity -
SRG-APP-000149
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to use a DoD Central Directory Service to provide multifactor authentication for network access to privileged and non-privileged accounts.
<VulnDiscussion>A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring atte...Rule Medium Severity -
SRG-APP-000151
<GroupDescription></GroupDescription>Group -
All UEM server local accounts created during application installation and configuration must be removed. Note: In this context local accounts refers to user and or administrator accounts on the server that use user name and password for user access and authentication.
<VulnDiscussion>A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring atte...Rule Medium Severity -
SRG-APP-000153
<GroupDescription></GroupDescription>Group -
The UEM server must ensure users are authenticated with an individual authenticator prior to using a group authenticator.
<VulnDiscussion>To ensure individual accountability and prevent unauthorized access, application users must be individually identified and au...Rule Medium Severity -
SRG-APP-000154
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to use DoD PKI for multifactor authentication. This requirement is included in SRG-APP-000149.
<VulnDiscussion>Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the...Rule Medium Severity -
SRG-APP-000156
<GroupDescription></GroupDescription>Group -
The UEM server must use FIPS-validated SHA-2 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...Rule High Severity -
SRG-APP-000157
<GroupDescription></GroupDescription>Group -
The UEM server must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...Rule Medium Severity -
SRG-APP-000163
<GroupDescription></GroupDescription>Group -
The UEM server must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
<VulnDiscussion>Inactive identifiers pose a risk to systems and applications. Attackers that are able to exploit an inactive identifier can p...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.