V-251264 | High | The Workspace ONE UEM must use multifactor authentication for local access to privileged accounts. | To ensure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system.
Multifactor... |
V-221646 | High | The Workspace ONE UEM server must be maintained at a supported version. | The MDM/EMM vendor maintains specific product versions for a specific period of time. MDM/EMM server versions no longer supported by the vendor will not receive security updates for new... |
V-251259 | High | The Workspace ONE UEM local accounts password must be configured with length of 15 characters. | The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised.
Password complexity, or strength, is a measure of the... |
V-251263 | High | The Workspace ONE UEM must enforce the limit of three consecutive invalid logon attempts by a user. | By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the... |
V-251262 | High | The Workspace ONE UEM local accounts must prohibit password reuse for a minimum of five generations. | Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks.
To meet password policy requirements, passwords need... |
V-251261 | High | The Workspace ONE UEM local accounts must be configured with password maximum lifetime of 60 days. | Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals.
One method of minimizing this risk is to use complex passwords and... |
V-251260 | High | The Workspace ONE UEM local accounts must be configured with at least one lowercase character, one uppercase character, one number, and one special character. | Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in... |
V-221637 | Medium | The Workspace ONE UEM server or platform must be configured to initiate a session lock after a 15-minute period of inactivity. | A session time-out lock is a temporary action taken when a user (MDM system administrator) stops work and moves away from the immediate physical vicinity of the information system but does not log... |
V-221650 | Medium | All Workspace ONE UEM server local accounts created during application installation and configuration must be disabled or removed. | A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring attention are consistently and promptly addressed. If an attacker... |
V-221648 | Medium | The firewall protecting the Workspace ONE UEM server must be configured to restrict all network traffic to and from all addresses with the exception of ports, protocols, and IP address ranges required to support MDM server and platform functions. | Most information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential... |
V-221649 | Medium | The firewall protecting the Workspace ONE UEM server must be configured so that only DoD-approved ports, protocols, and services are enabled. (See the DoD Ports, Protocols, Services Management [PPSM] Category Assurance Levels [CAL] list for DoD-approved ports, protocols, and services). | All ports, protocols, and services used on DoD networks must be approved and registered via the DoD PPSM process. This is to ensure that a risk assessment has been completed before a new port,... |
V-221647 | Medium | The Workspace ONE UEM server must be protected by a DoD-approved firewall. | Most information systems are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential... |
V-221644 | Medium | The Workspace ONE UEM server must be configured to leverage the MDM platform user and administrator accounts and groups for Workspace ONE UEM server user identification and authentication. | A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring attention are consistently and promptly addressed. If an attacker... |
V-221645 | Medium | Authentication of MDM platform accounts must be configured so they are implemented via an enterprise directory service. | A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring attention are consistently and promptly addressed. If an attacker... |
V-221642 | Medium | The Workspace ONE UEM server must be configured with a periodicity for reachable events of six hours or less for the following commands to the agent:
- query connectivity status;
- query the current version of the MD firmware/software;
- query the current version of installed mobile applications;
- read audit logs kept by the MD.
| Key security-related status attributes must be queried frequently so the Workspace ONE UEM server can report status of devices under management to the administrator and management. The periodicity... |
V-221643 | Medium | The Workspace ONE UEM server must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, or auditor. | Having several administrative roles for the Workspace ONE UEM server supports separation of duties. This allows administrator-level privileges to be granted granularly, such as giving application... |
V-221640 | Medium | The Workspace ONE UEM server must be configured to transfer Workspace ONE UEM server logs to another server for storage, analysis, and reporting.
Note: Workspace ONE UEM server logs include logs of MDM events and logs transferred to the Workspace ONE UEM server by MDM agents of managed devices. | Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. Since the Workspace ONE UEM server has limited capability to store mobile device log files... |
V-221641 | Medium | The Workspace ONE UEM server must be configured to display the required DoD warning banner upon administrator logon.
Note: This requirement is not applicable if the TOE platform is selected in FTA_TAB.1.1 in the Security Target (ST). | Note: The advisory notice and consent warning message is not required if the general purpose OS or network device displays an advisory notice and consent warning message when the administrator... |
V-221638 | Medium | The Workspace ONE UEM server must be configured with an enterprise certificate for signing policies (if function is not automatically implemented during Workspace ONE UEM server install). | It is critical that only authorized certificates are used for key activities such as code signing for system software updates, code signing for integrity verification, and policy signing.... |
V-221651 | Medium | The MDM Agent must be configured to enable the following function: [selection: read audit logs of the MD].
This requirement is inherently met if the function is automatically implemented during MDM Agent install/device enrollment.
| Audit logs and alerts enable monitoring of security-relevant events and subsequent forensics when breaches occur. They help identify when the security posture of the device is not as expected.... |