Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-36202 | SRG-APP-175-MDM-189-MEM | SV-47606r1_rule | Medium |
Description |
---|
If the user is aware that a certificate has been issued from an untrusted certificate authority, the user can opt not to proceed or, alternatively, is better prepared to identify suspicious behavior that indicates an IA incident is in progress. Failure to notify the user of this occurrence makes it more likely that an adversary can launch an attack from an untrusted system. |
STIG | Date |
---|---|
Mobile Device Manager Security Requirements Guide | 2013-01-24 |
Check Text ( C-44442r1_chk ) |
---|
Determine if the MDM server includes a mobile email management capability. If no, this requirement is not applicable. If yes, perform the following procedure: Verify the mobile email client alerts the user if it receives a public-key certificate issued from an untrusted certificate authority. Talk to the site system administrator and have them confirm this capability exists in the email management client. Also, review the MDM server configuration. If the mobile email client does not alert the user if it receives a public-key certificate issued from an untrusted certificate authority, this is a finding. |
Fix Text (F-40732r1_fix) |
---|
Configure the MDM server to alert the user if it receives a public-key certificate issued from an untrusted certificate authority, if this capability exists. |