Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-36212 | SRG-APP-175-MDM-196-MEM | SV-47616r1_rule | Medium |
Description |
---|
If the user is aware that a certificate is invalid, the user can opt not to proceed or, alternatively, is better prepared to identify suspicious behavior that indicates an IA incident is in progress. Failure to notify the user of this occurrence makes it more likely that an adversary can launch an attack from an untrusted system. |
STIG | Date |
---|---|
Mobile Device Manager Security Requirements Guide | 2013-01-24 |
Check Text ( C-44452r1_chk ) |
---|
Determine if the MDM server includes a mobile email management capability. If no, this requirement is not applicable. If yes, perform the following procedure: Verify the mobile email client alerts the user if it receives a public-key certificate with a non-FIPS approved algorithm. Talk to the site system administrator and have them confirm this capability exists in the MDM server. Also, review the MDM server configuration. If the mobile email client does not that alert the user if it receives a public-key certificate with a non-FIPS approved algorithm, this is a finding. |
Fix Text (F-40742r1_fix) |
---|
Configure the MDM server to alert the user if it receives a public-key certificate with a non-FIPS approved algorithm. |