UCF STIG Viewer Logo

The mobile operating system must maintain the binding of digital signatures on software components and applications in storage.


Overview

Finding ID Version Rule ID IA Controls Severity
V-33247 SRG-OS-000236-MOS-000124 SV-43665r1_rule Medium
Description
Digital signatures enable the system to verify the integrity of the signed object and authenticate the object's signatory. Failure to maintain the binding of digital signatures on software components and applications in storage makes it more likely that an adversary could modify or replace those objects. Conversely, the bindings enable the operating system to verify the software's integrity and source with a high degree of assurance whenever necessary.
STIG Date
Mobile Operating System Security Requirements Guide 2013-07-03

Details

Check Text ( C-41543r1_chk )
Review the mobile operating system configuration for maintaining binding of digital signatures to software objects when those objects are stored after installation. If these bindings are not maintained in storage, this is a finding.
Fix Text (F-37177r1_fix)
Configure the operating system to maintain the binding of digital signatures on software components and applications in storage.