UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The UEM server must be configured to verify software updates to the server using a digital signature mechanism prior to installing those updates.


Overview

Finding ID Version Rule ID IA Controls Severity
V-234629 SRG-APP-000479-UEM-000354 SV-234629r617355_rule Medium
Description
Unauthorized modifications to software or firmware may be indicative of a sophisticated, targeted cyber-attack. Cryptographic authentication includes, for example, verifying that software or firmware components have been digitally signed using certificates recognized and approved by organizations. Code signing is an effective method to protect against malicious code. Satisfies:FPT_TUD_EXT.1.3
STIG Date
Unified Endpoint Management Server Security Requirements Guide 2020-12-14

Details

Check Text ( C-37814r616008_chk )
Verify the UEM server verifies software updates to the server using a digital signature mechanism prior to installing those updates.

If the UEM server does not verify software updates to the server using a digital signature mechanism prior to installing those updates, this is a finding.
Fix Text (F-37779r615522_fix)
Configure the UEM server to verify software updates to the server using a digital signature mechanism prior to installing those updates.