UCF STIG Viewer Logo

The MDM server device integrity validation component must provide the capability for the site administrator to amend information on mitigation actions that have taken place (e.g., wipe the device) to the scan report before the report is archived.


Overview

Finding ID Version Rule ID IA Controls Severity
V-36198 SRG-APP-262-MDM-186-MDIS SV-47602r1_rule High
Description
One of the most significant indicators of an IA attack is modification of operating system files, device drivers, or security enforcement mechanisms. An integrity verification capability or tool detects unauthorized modifications to files or permissions and either prevents further operation or reports its findings so an appropriate response can occur.
STIG Date
Mobile Device Manager Security Requirements Guide 2013-01-24

Details

Check Text ( C-44438r1_chk )
Review the MDM server configuration to ensure the MDM server device integrity validation component can provide the capability for the site administrator to amend information on mitigation actions that have taken place (e.g., wipe the device) to the scan report before the report is archived. If this function is not present, this is a finding.
Fix Text (F-40728r1_fix)
Configure the MDM server device integrity validation component to allow the site administrator to amend information on mitigation actions that have taken place (e.g., wipe the device) to the scan report before the report is archived.