UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The MDM server must separate the security functions between the management of the server itself, and the management of the mobile device.


Overview

Finding ID Version Rule ID IA Controls Severity
V-36352 SRG-APP-238-MDM-288-SRV SV-47756r1_rule Low
Description
Security functions are defined as "the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based." If the security functions were to be undermined, the MDM server could be compromised. MDM server administrators can increase the assurance in security functions by employing well-defined security policy models, structured, disciplined, and rigorous hardware and software development techniques, and sound system/security engineering principles. The MDM server element must isolate security functions from non-security functions by means of an isolation boundary (implemented via partitions and domains) controlling access to and protecting the integrity of, the hardware, software, and firmware performing those security functions. The MDM server must maintain a separate execution domain (e.g., address space) for each executing process.
STIG Date
Mobile Device Manager Security Requirements Guide 2013-01-24

Details

Check Text ( C-44594r1_chk )
Review MDM server documentation and determine if the MDM server separates the security functions between the management of the server itself, and the management of the mobile device. If the MDM server does not separate the security functions between the management of the server itself, and the management of the mobile device, this is a finding.
Fix Text (F-40884r1_fix)
Configure the MDM server to separate the security functions between the management of the server itself, and the management of the mobile device