UCF STIG Viewer Logo

The MDM server must protect the integrity of information during the processes of data aggregation, packaging, and transformation in preparation for transmission.


Overview

Finding ID Version Rule ID IA Controls Severity
V-36060 SRG-APP-239-MDM-056-SRV SV-47450r1_rule Low
Description
Information can be subjected to unauthorized changes (e.g., malicious and/or unintentional modification) at information aggregation or protocol transformation points. It is therefore imperative the application take steps to validate and assure the integrity of data while at these stages of processing.
STIG Date
Mobile Device Manager Security Requirements Guide 2013-01-24

Details

Check Text ( C-44299r1_chk )
Review the MDM server configuration to ensure the system is protecting the integrity of information during the processes of data aggregation, packaging, and transformation in preparation for transmission. If the MDM server is not configured in this fashion, this is a finding.
Fix Text (F-40590r1_fix)
Configure the MDM server to protect the integrity of information during the processes of data aggregation, packaging, and transformation in preparation for transmission.