UCF STIG Viewer Logo

Applications involved in the production, control, and distribution of asymmetric cryptographic keys must use approved PKI Class 3 or class 4 certificates and hardware tokens that protect the users private key.


Overview

Finding ID Version Rule ID IA Controls Severity
V-36340 SRG-APP-195-NA SV-47744r1_rule Medium
Description
Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. Rationale for non-applicability: The MDM server is not involved in the production, control, and distribution of asymmetric cryptographic keys.
STIG Date
Mobile Device Manager Security Requirements Guide 2013-01-24

Details

Check Text ( C-44582r1_chk )
This requirement is NA for the MDM server SRG.
Fix Text (F-40872r1_fix)
The requirement is NA. No fix is required.