III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000149
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to use a DoD Central Directory Service to provide multifactor authentication for network access to privileged and non-privileged accounts.
<VulnDiscussion>A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring atte...Rule Medium Severity -
SRG-APP-000151
<GroupDescription></GroupDescription>Group -
All UEM server local accounts created during application installation and configuration must be removed. Note: In this context local accounts refers to user and or administrator accounts on the server that use user name and password for user access and authentication.
<VulnDiscussion>A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring atte...Rule Medium Severity -
SRG-APP-000153
<GroupDescription></GroupDescription>Group -
The UEM server must ensure users are authenticated with an individual authenticator prior to using a group authenticator.
<VulnDiscussion>To ensure individual accountability and prevent unauthorized access, application users must be individually identified and au...Rule Medium Severity -
SRG-APP-000154
<GroupDescription></GroupDescription>Group -
The UEM server must be configured to use DOD PKI for multifactor authentication. This requirement is included in SRG-APP-000149.
<VulnDiscussion>Using an authentication device, such as a common access card (CAC) or token that is separate from the information system, ens...Rule Medium Severity -
SRG-APP-000156
<GroupDescription></GroupDescription>Group -
The UEM server must use FIPS-validated SHA-2 or higher hash function to provide replay-resistant authentication mechanisms for network access to privileged accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...Rule High Severity -
SRG-APP-000157
<GroupDescription></GroupDescription>Group -
The UEM server must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...Rule Medium Severity -
SRG-APP-000164
<GroupDescription></GroupDescription>Group -
The UEM server must enforce a minimum 15-character password length.
<VulnDiscussion>The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...Rule Medium Severity -
SRG-APP-000165
<GroupDescription></GroupDescription>Group -
The UEM server must prohibit password reuse for a minimum of five generations.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-APP-000166
<GroupDescription></GroupDescription>Group -
The UEM server must enforce password complexity by requiring that at least one uppercase character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000167
<GroupDescription></GroupDescription>Group -
The UEM server must enforce password complexity by requiring that at least one lowercase character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.