I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000585
<GroupDescription></GroupDescription>Group -
If cipher suites using pre-shared keys are used for device authentication, the UEM server must have a minimum security strength of 112 bits or higher.
<VulnDiscussion>Pre-shared keys are symmetric keys that are already in place prior to the initiation of a Transport Layer Security (TLS) sess...Rule Medium Severity -
SRG-APP-000605
<GroupDescription></GroupDescription>Group -
The UEM server must validate certificates used for Transport Layer Security (TLS) functions by performing RFC 5280-compliant certification path validation.
<VulnDiscussion>A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA)...Rule Medium Severity -
SRG-APP-000610
<GroupDescription></GroupDescription>Group -
The application must use FIPS-validated SHA-256 or higher hash function for digital signature generation and verification.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Note: Altho...Rule High Severity -
SRG-APP-000427
<GroupDescription></GroupDescription>Group -
The UEM server must provide digitally signed policies and policy updates to the UEM agent.
<VulnDiscussion>It is critical that the UEM server sign all policy updates with validated certificates. Otherwise, there is no assurance that...Rule High Severity -
SRG-APP-000427
<GroupDescription></GroupDescription>Group -
The UEM server must sign policies and policy updates using a private key associated with [selection: an X509 certificate, a public key provisioned to the agent trusted by the agent] for policy verification.
<VulnDiscussion>It is critical that the UEM server sign all policy updates with validated certificate or private keys. Otherwise, there is no...Rule High Severity -
SRG-APP-000427
<GroupDescription></GroupDescription>Group -
The UEM server, for each unique policy managed, must validate the policy is appropriate for an agent using [selection: a private key associated with an X509 certificate representing the agent, a token issued by the agent] associated with a policy signing key uniquely associated with the policy.
<VulnDiscussion>It is critical that the UEM server sign all policy updates with validated certificate or private keys. Otherwise, there is no...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.