I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000514-UEM-000389
<GroupDescription></GroupDescription>Group -
The Ivanti EPMM server must use a FIPS-validated cryptographic module to generate cryptographic hashes.
<VulnDiscussion>FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...Rule High Severity -
SRG-APP-000515-UEM-000390
<GroupDescription></GroupDescription>Group -
The Ivanti EPMM server must, at a minimum, off-load audit logs of interconnected systems in real time and off-load standalone systems weekly.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-APP-000516-UEM-000391
<GroupDescription></GroupDescription>Group -
The Ivanti EPMM server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
<VulnDiscussion>Configuring the application to implement organization-wide security implementation guides and security checklists ensures com...Rule Medium Severity -
SRG-APP-000555-UEM-000393
<GroupDescription></GroupDescription>Group -
The Ivanti EPMM server must be configured to implement FIPS 140-2 mode for all server and agent encryption.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-APP-000345-UEM-000218
<GroupDescription></GroupDescription>Group -
The Ivanti EPMM server must configured to lock administrator accounts after three unsuccessful login attempts.
<VulnDiscussion>By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-APP-000345-UEM-000218
<GroupDescription></GroupDescription>Group -
The Ivanti EPMM server must be configured to lock an administrator's account for at least 15 minutes after the account has been locked because the maximum number of unsuccessful login attempts has been exceeded.
<VulnDiscussion>By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.