Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-32750 | WIR-WMS-MDIS-03 | SV-43096r1_rule | ECAT-1 | High |
Description |
---|
Detection of possible compromise of a DoD mobile device is a key security control to insure the compromise does not result in the exposure of sensitive DoD data or lead to a successful attack on the DoD network. Automated methods are the only viable way to scan and report on more than a handful of managed devices. |
STIG | Date |
---|---|
Mobile Device Integrity Scanning (MDIS) Server Security Technical Implementation Guide (STIG) | 2012-07-20 |
Check Text ( C-41083r6_chk ) |
---|
Verify the MDIS server and agent implement automated mechanisms to detect the presence of unauthorized software on managed mobile devices and notify designated organizational officials in accordance with the organization defined frequency. Talk to the site system administrator and have them show this capability exists in the MDIS server and is enabled. Also, review MDIS product documentation. Mark as a finding if the MDIS server does not have required features. |
Fix Text (F-36631r4_fix) |
---|
Use a MDIS product that provides automated mechanisms to detect the presence of unauthorized software on managed mobile devices and notifies designated organizational officials in accordance with the organization defined frequency and enable the feature. |