Check: SRG-APP-000191-UEM-000119
Unified Endpoint Management Agent SRG:
SRG-APP-000191-UEM-000119
(in version v1 r0.1)
Title
The UEM server must be configured to invoke either host-OS functionality or server functionality to provide a trusted communication channel between itself and managed devices that provides assured identification of its endpoints and protection of the communicated data from modification and disclosure using [selection: -TLS, -HTTPS]. (Cat II impact)
Discussion
Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Nonlocal maintenance and diagnostic activities are activities conducted by individuals communicating through either an external network (e.g., the internet) or an internal network.
Check Content
Verify the UEM server invokes either host-OS functionality or server functionality to provide a trusted communication channel between itself and managed devices that provides assured identification of its endpoints and protection of the communicated data from modification and disclosure using [selection: -TLS, -HTTPS]. If the UEM server does not invoke either host-OS functionality or server functionality to provide a trusted communication channel between itself and managed devices that provides assured identification of its endpoints and protection of the communicated data from modification and disclosure using [selection: -TLS, -HTTPS], this is a finding.
Fix Text
Configure the UEM server to invoke either host-OS functionality or server functionality to provide a trusted communication channel between itself and managed devices that provides assured identification of its endpoints and protection of the communicated data from modification and disclosure using [selection: -TLS, -HTTPS].
Additional Identifiers
Rule ID: SRG-APP-000191-UEM-000119_rule
Vulnerability ID: SRG-APP-000191-UEM-000119
Group Title: SRG-APP-000191-UEM-000119
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-001135 |
Provide a physically or logically isolated trusted communication path for communication between the user and the trusted components of the system. |
Controls
| Number | Title |
|---|---|
| SC-11 |
Trusted Path |