Strong access controls are critical to securing the MDM server. Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) must be employed by the MDM server when applicable to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains) in the MDM server.
Without stringent logical access and authorization controls to the MDM server, an adversary may have the ability, with very little effort, to compromise the MDM server and associated supporting infrastructure. |