UCF STIG Viewer Logo

The AirWatch MDM Server platform must be protected by a DoD-approved firewall.


Overview

Finding ID Version Rule ID IA Controls Severity
V-71635 VMAW-09-200040 SV-86259r1_rule Medium
Description
Most information systems are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Unneeded services and processes provide additional threat vectors and avenues of attack to the information system. The AirWatch MDM Server is a critical component of the mobility architecture and must be configured to only those ports, protocols, and services (PPS) necessary to support functionality, all others must be expressly disabled or removed. A DoD-approved firewall implements the required network restrictions. A host-based firewall is appropriate where the AirWatch MDM Server runs on a standalone platform. Network firewalls or other architectures may be preferred where the AirWatch MDM Server runs in a cloud or virtualized solution. SFR ID: FMT_SMF.1.1(1) Refinement
STIG Date
VMware AirWatch v9.x MDM Security Technical Implementation Guide 2016-09-20

Details

Check Text ( C-71965r1_chk )
Review the network configuration of the network segment the AirWatch MDM server appliance is installed on to determine whether a DoD-approved firewall is installed to filter all IP traffic to/from the MDM appliance.

If there is not a firewall present on the network segment the AirWatch MDM server appliance is installed on, or if it is not configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments, this is a finding.
Fix Text (F-77961r1_fix)
Install a DoD-approved firewall to protect the network segment the AirWatch MDM server is installed on.