Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.

    &lt;VulnDiscussion&gt;Configuring the application to implement organization-wide security implementation guides and security checklists ensures com...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to allow authorized administrators to read all audit data from audit records on the server.

    &lt;VulnDiscussion&gt;Successful incident response and auditing relies on timely, accurate system information and analysis in order to allow the or...
    Rule Medium Severity
  • SRG-APP-000555

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to implement FIPS 140-2 mode for all server and agent encryption.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-APP-000560

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0.

    &lt;VulnDiscussion&gt;Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...
    Rule Medium Severity
  • SRG-APP-000580

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must authenticate endpoint devices (servers) before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity
  • SRG-APP-000585

    <GroupDescription></GroupDescription>
    Group
  • If cipher suites using pre-shared keys are used for device authentication, the UEM server must have a minimum security strength of 112 bits or higher.

    &lt;VulnDiscussion&gt;Pre-shared keys are symmetric keys that are already in place prior to the initiation of a Transport Layer Security (TLS) sess...
    Rule Medium Severity
  • SRG-APP-000605

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must validate certificates used for Transport Layer Security (TLS) functions by performing RFC 5280-compliant certification path validation.

    &lt;VulnDiscussion&gt;A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...
    Rule Medium Severity
  • SRG-APP-000610

    <GroupDescription></GroupDescription>
    Group
  • The application must use FIPS-validated SHA-256 or higher hash function for digital signature generation and verification.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Note: Altho...
    Rule High Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must provide digitally signed policies and policy updates to the UEM agent.

    &lt;VulnDiscussion&gt;It is critical that the UEM server sign all policy updates with validated certificates. Otherwise, there is no assurance that...
    Rule High Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must sign policies and policy updates using a private key associated with [selection: an X509 certificate, a public key provisioned to the agent trusted by the agent] for policy verification.

    &lt;VulnDiscussion&gt;It is critical that the UEM server sign all policy updates with validated certificate or private keys. Otherwise, there is no...
    Rule High Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The UEM server, for each unique policy managed, must validate the policy is appropriate for an agent using [selection: a private key associated with an X509 certificate representing the agent, a token issued by the agent] associated with a policy signing key uniquely associated with the policy.

    &lt;VulnDiscussion&gt;It is critical that the UEM server sign all policy updates with validated certificate or private keys. Otherwise, there is no...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules