STIGQter STIGQter: STIG Summary:

MobileIron Core v10.x MDM Security Technical Implementation Guide

Version: 1

Release: 1 Benchmark Date: 15 Feb 2019

CheckedNameTitle
SV-101909r1_ruleThe MobileIron Core v10 server must be able to limit user enrollment of devices that do not have required OS type and version.
SV-101911r1_ruleThe MobileIron Core v10 server or platform must be configured to initiate a session lock after a 15-minute period of inactivity.
SV-101913r1_ruleThe MobileIron Core v10 server must be configured to transfer MobileIron Core v10 server logs to another server for storage, analysis, and reporting. Note: MobileIron Core v10 server logs include logs of MDM events and logs transferred to the MobileIron Core v10 server by MDM agents of managed devices.
SV-101915r1_ruleThe MobileIron Core v10 server must be configured to display the required DoD warning banner upon administrator logon. Note: This requirement is not applicable if the TOE platform is selected in FTA_TAB.1.1 in the Security Target (ST).
SV-101917r1_ruleThe MobileIron Core v10 server must be configured with a periodicity for reachable events of six hours or less for the following commands to the agent: - query connectivity status; - query the current version of the MD firmware/software; - query the current version of the hardware model of the device; - query the current version of installed mobile applications; - read audit logs kept by the MD.
SV-101919r1_ruleThe MobileIron Core v10 server must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, auditor.
SV-101921r1_ruleThe MobileIron Core v10 server must be configured to implement FIPS 140-2 mode for all server encryption (if not automatically configured during server install).
SV-101923r1_ruleAuthentication of MDM platform accounts must be configured so they are implemented via an enterprise directory service.
SV-101925r1_ruleThe MDM server platform must be protected by a DoD-approved firewall.
SV-101927r1_ruleThe firewall protecting the MDM server platform must be configured to restrict all network traffic to and from all addresses with the exception of ports, protocols, and IP address ranges required to support MDM server and platform functions.
SV-101929r1_ruleThe firewall protecting the MDM server platform must be configured so that only DoD-approved ports, protocols, and services are enabled. (See the DoD Ports, Protocols, Services Management [PPSM] Category Assurance Levels [CAL] list for DoD-approved ports, protocols, and services.)