UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The MDIS server must provide notifications regarding suspicious events to an organization defined list of response personnel, including the IAO and system administrator, who are identified by name and/or by role.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32755 WIR-WMS-MDIS-08 SV-43101r1_rule ECAT-1 ECAT-2 Medium
Description
Detection of possible compromise of a DoD mobile device is a key security control to insure the compromise does not result in the exposure of sensitive DoD data or lead to a successful attack on the DoD network. Timely alerting is required to ensure proper management oversight is provided to mitigation actions to reduce the effect of the compromise.
STIG Date
Mobile Device Integrity Scanning (MDIS) Server Security Technical Implementation Guide (STIG) 2013-01-17

Details

Check Text ( C-41088r9_chk )
Verify the MDIS server provides alerts of suspicious events to an organization defined list of response personnel, including the IAO and system administrator, who are identified by name and/or by role. Talk to the site system administrator and have them show this capability exists in the MDIS server and is enabled. Also, review MDIS product documentation.

Mark as a finding if the MDIS server does not have required features
Fix Text (F-36637r5_fix)
Use an MDIS product that provides alerts of suspicious events to an organization defined list of response personnel, including the IAO and system administrator, who are identified by name and/or by role.