Check: SRG-APP-000151-UEM-000085
Unified Endpoint Management Server SRG:
SRG-APP-000151-UEM-000085
(in versions v2 r3 through v2 r1)
Title
All UEM server local accounts created during application installation and configuration must be removed. Note: In this context local accounts refers to user and or administrator accounts on the server that use user name and password for user access and authentication. (Cat II impact)
Discussion
A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring attention are consistently and promptly addressed. If an attacker compromises an account, the entire MDM server infrastructure is at risk. Providing automated support functions for the management of accounts will ensure only active accounts will be granted access with the proper authorization levels. These objectives are best achieved by configuring the MDM server to leverage an enterprise authentication mechanism (e.g., Microsoft Active Directory Kerberos). Satisfies:FMT_SMF.1.1(2) b / IA-5(1)(a) Reference:PP-MDM-431007
Check Content
Verify all UEM server local accounts created during application installation and configuration have been removed. Note: In this context, "local" accounts refers to user and or administrator accounts on the server that use user name and password for user access and authentication. If all UEM server local accounts created during application installation and configuration have not been removed, this is a finding.
Fix Text
Remove all UEM server local accounts created during application installation. Note: In this context, "local" accounts refers to user and or administrator accounts on the server that use user name and password for user access and authentication.
Additional Identifiers
Rule ID: SV-234358r985742_rule
Vulnerability ID: V-234358
Group Title: SRG-APP-000151
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000765 |
Implement multifactor authentication for access to privileged accounts. |
Controls
Number | Title |
---|---|
IA-2(1) |
Network Access to Privileged Accounts |