Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-24970 | WIR-WMSP-001-01 | SV-30707r4_rule | PRTN-1 | Low |
Description |
---|
The security posture of the CMD management server could be compromised if the administrator is not trained to follow required procedures. |
STIG | Date |
---|---|
CMD Management Server Policy Security Technical Implementation Guide (STIG) | 2013-04-16 |
Check Text ( C-31134r4_chk ) |
---|
Detailed policy requirements: The CMD management server administrator must be trained on the following requirements: -Requirement that administrative service accounts will not be used to log into the CMD management server or any server service. -Activation passwords or PINs will consist of a pseudo-random pattern of at least eight characters consisting of at least two letters and two numbers. A new activation password must be selected each time one is assigned (e.g., the same password cannot be used for all users or for a group of users). -User and group accounts on the CMD management server will always be assigned a STIG-compliant security/IT policy. Check procedures: -Verify the CMD management server administrator(s) has received the required training. The site should document when the training was completed. Mark as a finding if CMD management server administrator did not receive required training. |
Fix Text (F-27604r1_fix) |
---|
Have smartphone management server administrator complete and document his/her training. |