Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-234360 | SRG-APP-000153-UEM-000087 | SV-234360r879594_rule | Medium |
Description |
---|
To ensure individual accountability and prevent unauthorized access, application users must be individually identified and authenticated. Individual accountability mandates that each user is uniquely identified. A group authenticator is a shared account or some other form of authentication that allows multiple unique individuals to access the application using a single account. If an application allows or provides for group authenticators, it must first individually authenticate users prior to implementing group authenticator functionality. Some applications may not have the need to provide a group authenticator; this is considered a matter of application design. In those instances where the application design includes the use of a group authenticator, this requirement will apply. There may also be instances when specific user actions need to be performed on the information system without unique user identification or authentication. An example of this type of access is a web server which contains publicly releasable information. Satisfies: FIA Reference:PP-MDM-414003 |
STIG | Date |
---|---|
Unified Endpoint Management Server Security Requirements Guide | 2023-02-13 |
Check Text ( C-37545r614090_chk ) |
---|
Requirement is Not Applicable when UEM server is configured to use DoD Central Directory Service for administrator account authentication. Verify the UEM server ensures users are authenticated with an individual authenticator prior to using a group authenticator. If the UEM server does not ensure users are authenticated with an individual authenticator prior to using a group authenticator, this is a finding. |
Fix Text (F-37510r614091_fix) |
---|
Configure the UEM server to ensure users are authenticated with an individual authenticator prior to using a group authenticator. |