III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000507
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records when successful/unsuccessful accesses to objects occur.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000508
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records for all direct access to the information system.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000509
<GroupDescription></GroupDescription>Group -
The UEM server must generate audit records for all account creations, modifications, disabling, and termination events.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-APP-000514
<GroupDescription></GroupDescription>Group -
The UEM server must use a FIPS-validated cryptographic module to generate cryptographic hashes.
<VulnDiscussion>FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data withi...Rule High Severity -
SRG-APP-000515
<GroupDescription></GroupDescription>Group -
The UEM server must, at a minimum, off-load audit logs of interconnected systems in real time and off-load standalone systems weekly.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The UEM server must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
<VulnDiscussion>Configuring the application to implement organization-wide security implementation guides and security checklists ensures com...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to allow authorized administrators to read all audit data from audit records on the server.
<VulnDiscussion>Successful incident response and auditing relies on timely, accurate system information and analysis in order to allow the or...Rule Medium Severity -
SRG-APP-000555
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to implement FIPS 140-2 mode for all server and agent encryption.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-APP-000560
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0.
<VulnDiscussion>Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...Rule Medium Severity -
SRG-APP-000580
<GroupDescription></GroupDescription>Group -
The UEM server must authenticate endpoint devices (servers) before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.