Identify the classified data stored, transmitted, or processed by the MDM server. Data processed by the MDM server that may be classified includes, but is not limited to, vulnerability-related alerts and audit log entries and, if the MDM processes email, the content of classified email messages.
Once the classified data are identified, determine whether there are any applicable DAR and DIT requirements for cryptography. Classified DIT transmitted between CMD and the MDM server must be encrypted. In general, if either classified DIT or DAR remain within a protected enclave that otherwise meets requirements for classified computing, then there are no requirements for encryption. However, local command or site policies requiring encryption will apply if they exist. If classified DIT leaves a protected enclave then it must be encrypted. For example, classified vulnerability messages transmitted to an enterprise intrusion detection or response center must be encrypted if those messages are transmitted from the enclave in which the MDM server resides to the enclave in which the enterprise servers reside over a medium at a lower level of classification.
Once the requirements have been identified, determine the network component used to comply with the requirement. For example, when classified DIT is transmitted across network boundaries, HAIPE technology in the infrastructure may be used to protect DIT. In this case, the requirement does not apply to the MDM server.
For all identified classified DAR and DIT requirements addressed by the MDM server, review documentation associated with the cryptography implemented to comply with the requirement. Any cryptography used to protect classified DAR or DIT in this circumstance must be NSA-approved, although not necessarily with classified algorithms. If cryptography is not employed, or if the cryptography the MDM server employs is not NSA approved, this is a finding.
Note: In cases where NSA approved encryption is not required as described above, organizations may implement cryptography to protect classified DAR or DIT when as a defense in depth measure or other for reasons. In these cases, the cryptography need not be NSA-approved. |