Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000002

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must conceal, via the session lock, information previously visible on the display with a publicly viewable image.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-APP-000003

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must initiate a session lock after a 15-minute period of inactivity.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-APP-000004

    <GroupDescription></GroupDescription>
    Group
  • The MDM server must provide the capability for users to directly initiate a session lock.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-APP-000005

    <GroupDescription></GroupDescription>
    Group
  • The MDM server must retain the session lock until the user reestablishes access using established identification and authentication procedures.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-APP-000014

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must use TLS 1.2, or higher, to protect the confidentiality of sensitive data during electronic dissemination using remote access.

    &lt;VulnDiscussion&gt;Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and u...
    Rule Medium Severity
  • SRG-APP-000023

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must provide automated mechanisms for supporting account management functions.

    &lt;VulnDiscussion&gt;Enterprise environments make application account management challenging and complex. A manual process for account management ...
    Rule Medium Severity
  • SRG-APP-000024

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must automatically remove or disable temporary user accounts after 72 hours if supported by the UEM server.

    &lt;VulnDiscussion&gt;If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...
    Rule Medium Severity
  • SRG-APP-000025

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must automatically disable accounts after a 35-day period of account inactivity.

    &lt;VulnDiscussion&gt;Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an applicatio...
    Rule Medium Severity
  • SRG-APP-000026

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must automatically audit account creation.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Medium Severity
  • SRG-APP-000027

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must automatically audit account modification.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of re-establishing...
    Rule Medium Severity
  • SRG-APP-000028

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must automatically audit account disabling actions.

    &lt;VulnDiscussion&gt;When application accounts are disabled, user accessibility is affected. Once an attacker establishes access to an application...
    Rule Medium Severity
  • SRG-APP-000029

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must automatically audit account removal actions.

    &lt;VulnDiscussion&gt;When application accounts are removed, user accessibility is affected. Once an attacker establishes access to an application,...
    Rule Medium Severity
  • SRG-APP-000065

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-APP-000068

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application.

    &lt;VulnDiscussion&gt;Display of the DoD-approved use notification before granting access to the application ensures privacy and security notificat...
    Rule Medium Severity
  • SRG-APP-000069

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must retain the access banner until the user acknowledges acceptance of the access conditions.

    &lt;VulnDiscussion&gt;The banner must be acknowledged by the user prior to allowing the user access to the application. This provides assurance tha...
    Rule Low Severity
  • SRG-APP-000080

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.

    &lt;VulnDiscussion&gt;Without non-repudiation, it is impossible to positively attribute an action to an individual (or process acting on behalf of ...
    Rule Medium Severity
  • SRG-APP-000089

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must provide audit record generation capability for DoD-defined auditable events within all application components.

    &lt;VulnDiscussion&gt;Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...
    Rule Medium Severity
  • SRG-APP-000089

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to provide audit records in a manner suitable for the Authorized Administrators to interpret the information.

    &lt;VulnDiscussion&gt;Successful incident response and auditing relies on timely, accurate system information and analysis in order to allow the or...
    Rule Medium Severity
  • SRG-APP-000090

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to allow only specific administrator roles to select which auditable events are to be audited.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-APP-000091

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must generate audit records when successful/unsuccessful attempts to access privileges occur.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-APP-000092

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must initiate session auditing upon startup.

    &lt;VulnDiscussion&gt;If auditing is enabled late in the startup process, the actions of some start-up processes may not be audited. Some audit sys...
    Rule Medium Severity
  • SRG-APP-000095

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to produce audit records containing information to establish what type of events occurred.

    &lt;VulnDiscussion&gt;Without establishing what type of event occurred, it would be difficult to establish, correlate, and investigate the events r...
    Rule Medium Severity
  • SRG-APP-000096

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to produce audit records containing information to establish when (date and time) the events occurred.

    &lt;VulnDiscussion&gt;Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to a...
    Rule Medium Severity
  • SRG-APP-000097

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to produce audit records containing information to establish where the events occurred.

    &lt;VulnDiscussion&gt;Failure to generate these audit records makes it more difficult to identify or investigate attempted or successful compromise...
    Rule Medium Severity
  • SRG-APP-000098

    <GroupDescription></GroupDescription>
    Group
  • The UEM server must be configured to produce audit records containing information to establish the source of the events.

    &lt;VulnDiscussion&gt;Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules