Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000001

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must limit the number of concurrent sessions per privileged user account to three or less concurrent sessions.

    &lt;VulnDiscussion&gt;Application management includes the ability to control the number of users and user sessions that utilize an application. Lim...
    Rule Medium Severity
  • SRG-APP-000002

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must conceal, via the session lock, information previously visible on the display with a publicly viewable image.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-APP-000003

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must initiate a session lock after a 15-minute period of inactivity.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-APP-000004

    <GroupDescription></GroupDescription>
    Group
  • The MDM server must provide the capability for users to directly initiate a session lock.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-APP-000005

    <GroupDescription></GroupDescription>
    Group
  • The MDM server must retain the session lock until the user reestablishes access using established identification and authentication procedures.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-APP-000014

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must use TLS 1.2, or higher, to protect the confidentiality of sensitive data during electronic dissemination using remote access.

    &lt;VulnDiscussion&gt;Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...
    Rule Medium Severity
  • SRG-APP-000023

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must provide automated mechanisms for supporting account management functions.

    &lt;VulnDiscussion&gt;Enterprise environments make application account management challenging and complex. A manual process for account management ...
    Rule Medium Severity
  • SRG-APP-000024

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must automatically remove or disable temporary user accounts after 72 hours if supported by the UEM server.

    &lt;VulnDiscussion&gt;If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...
    Rule Medium Severity
  • SRG-APP-000025

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must automatically disable accounts after a 35-day period of account inactivity.

    &lt;VulnDiscussion&gt;Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an applicatio...
    Rule Medium Severity
  • SRG-APP-000026

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must automatically audit account creation.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules