UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Applications must enforce non-discretionary access control policies over users and resources where the policy rule set for each policy specifies: access control information (i.e., attributes) employed by the policy rule set (e.g., position, nationality, age, project, time of day).


Overview

Finding ID Version Rule ID IA Controls Severity
V-36378 SRG-APP-035-NA SV-47782r1_rule Medium
Description
Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) are employed to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains). Rationale for non-applicability: This control primarily applies to the discretionary sharing of information resources by data owners. This type of service is unrelated to MDM server functionality.
STIG Date
Mobile Device Manager Security Requirements Guide 2013-01-24

Details

Check Text ( C-44620r1_chk )
This requirement is NA for the MDM server SRG.
Fix Text (F-40910r1_fix)
The requirement is NA. No fix is required.