UCF STIG Viewer Logo

The MDM server must employ strong identification and authentication techniques in the establishment of non-local maintenance and diagnostic sessions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-36044 SRG-APP-185-MDM-040-SRV SV-47433r1_rule High
Description
Lack of authentication enables anyone to gain access to the MDM server. Network access control mechanisms interoperate to prevent unauthorized access and to enforce the organization's security policy. Authorization for access to the MDM server to perform maintenance and diagnostics requires an individual account identifier that has been approved, assigned, and configured. Authentication of non-local maintenance and diagnostics sessions must be accomplished through two-factor authentication via the combination of passwords, tokens, and biometrics.
STIG Date
Mobile Device Manager Security Requirements Guide 2013-01-24

Details

Check Text ( C-44283r1_chk )
Review the MDM server configuration to ensure the system is authenticating through the Enterprise Authentication Mechanism that employs strong identification and authentication techniques in the establishment of non-local maintenance and diagnostic sessions. If the MDM server is not authenticating through an Enterprise Authentication Mechanism that employs strong identification and authentication techniques in the establishment of non-local maintenance and diagnostic sessions, this is a finding.
Fix Text (F-40574r1_fix)
Configure the MDM server to authenticate through an Enterprise Authentication Mechanism that employs strong identification and authentication techniques in the establishment of non-local maintenance and diagnostic sessions.