II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000427
<GroupDescription></GroupDescription>Group -
The UEM server must only allow the use of DoD PKI established certificate authorities for verification of the establishment of protected sessions.
<VulnDiscussion>Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...Rule Medium Severity -
SRG-APP-000427
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to use X.509v3 certificates for code signing for system software updates.
<VulnDiscussion>It is critical that the UEM server validate code signing certificates for key activities such as code signing for system soft...Rule Medium Severity -
SRG-APP-000427
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to use X.509v3 certificates for code signing for integrity verification.
<VulnDiscussion>It is critical that the UEM server validate code signing certificates for key activities such as code signing for system soft...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
The UEM server must connect to [assignment: [list of applications]] and managed mobile devices with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.
<VulnDiscussion>Applications may include the following: update server, database, and enterprise directory service. Without protection of the ...Rule High Severity -
SRG-APP-000447
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to write to the server event log when invalid inputs are received.
<VulnDiscussion>A common vulnerability of applications is unpredictable behavior when invalid inputs are received. This requirement guards ag...Rule Medium Severity -
SRG-APP-000454
<GroupDescription></GroupDescription>Group -
The UEM server must remove old software components after updated versions have been installed.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
The UEM server must be maintained at a supported version.
<VulnDiscussion>The UEM vendor maintains specific product versions for a specific period of time. MDM/EMM server versions no longer supported...Rule High Severity -
SRG-APP-000472
<GroupDescription></GroupDescription>Group -
The UEM server must be configured with the periodicity of the following commands to the agent of six hours or less: - query connectivity status - query the current version of the managed device firmware/software - query the current version of installed mobile applications - read audit logs kept by the managed device.
<VulnDiscussion>Without verification, security functions may not operate correctly and this failure may go unnoticed. Security function is ...Rule Medium Severity -
SRG-APP-000473
<GroupDescription></GroupDescription>Group -
The UEM server must run a suite of self-tests during initial start-up (power on) to demonstrate correct operation of the server.
<VulnDiscussion>Without verification, security functions may not operate correctly and this failure may go unnoticed. Security function is ...Rule Medium Severity -
SRG-APP-000474
<GroupDescription></GroupDescription>Group -
The UEM server must alert the system administrator when anomalies in the operation of security functions are discovered.
<VulnDiscussion>If anomalies are not acted upon, security functions may fail to secure the system. Security function is defined as the hard...Rule Medium Severity -
SRG-APP-000479
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to verify software updates to the server using a digital signature mechanism prior to installing those updates.
<VulnDiscussion>Unauthorized modifications to software or firmware may be indicative of a sophisticated, targeted cyber-attack. Cryptographic...Rule Medium Severity -
SRG-APP-000492
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when successful/unsuccessful attempts to access security objects occur.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity -
SRG-APP-000495
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when successful/unsuccessful attempts to modify privileges occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000496
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when successful/unsuccessful attempts to modify security objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000499
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when successful/unsuccessful attempts to delete privileges occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000501
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when successful/unsuccessful attempts to delete security objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000503
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when successful/unsuccessful logon attempts occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000504
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records for privileged activities or other system-level access.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000505
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records showing starting and ending time for user access to the system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000506
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when concurrent logons from different workstations occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000507
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when successful/unsuccessful accesses to objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000508
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records for all direct access to the information system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000509
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
The UEM server must use a FIPS-validated cryptographic module to generate cryptographic hashes.
<VulnDiscussion>FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...Rule High Severity -
SRG-APP-000515
<GroupDescription></GroupDescription>Group -
The UEM server must, at a minimum, off-load audit logs of interconnected systems in real time and off-load standalone systems weekly.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.