Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Review the MaaS360 server console configuration to determine if before establishing a user session, the server displays an administrator-specified advisory notice and consent warning message regarding use of the MaaS360 Server. On the MaaS360 console complete the following steps: Have a System Administrator log-in to the portal and verify that the approved DoD Banner is displayed before the user obtains access to the console. If the MaaS360 server does not display an administrator-specified advisory notice and consent warning message regarding use of the MaaS360 Server before establishing a user session, this is a finding.
Configure the MaaS360 Server to display the appropriate warning banner text. For SaaS this step can only be implemented by IBM Master Administrator. Ensure that "Branding UI", and "Admin Portal Usage Agreement" are enabled. Then the IBM Master Administrator will edit the Terms of Agreement with the text provided by the Department of the Defense. For On-Premise this step can be implemented by the Master Administrator account created by the user. Ensure that "Branding UI", and "Admin Portal Usage Agreement" are enabled. Then the IBM Master Administrator will edit the Terms of Agreement with the text provided by the Department of the Defense.
Review the MaaS360 server console and confirm that different roles (administrator, auditor, user) are created with different levels of privileges providing separation of duties for different users/groups. On the MaaS360 console complete the following steps: 1. Go to Setup >> Roles 2. Verify all required roles are listed (Note: Role titles maybe different than listed in the requirement statement) 3. Select applicable role and select "edit", then verify that the role has the appropriate rights based on description in Vulnerability description. If the MaaS360 server does all required roles and the roles do not have appropriate rights, this is a finding.
On the MaaS360 console complete the following steps: 1. For each role do the following 2. Go to Setup >> Roles 3. Select the "Add Role" Button 4. Under "Basic Information" Input the Role Name and Role Description 5. Under "Select Mode of Creation" click on the "Create new" bubble and then click Next 6. Under "Grant Access Rights" select the appropriate rights for the role and then click Save
Review the MaaS360 server console and confirm the server is configured to alert for audit event failures on managed mobile devices. On the MaaS360 Console complete the following Steps: 1. Navigate to Security >> Policies and have system administrator identify which mobile operating system (iOS, etc.) the MDM policy alerts apply to. 2. Open identified policy and go to device settings >> application compliance. 3. Verify that "Configure required applications" is set to "yes" and that all new applications are listed 4. Repeat for other MOS as required (for example, Windows Phone, etc.) If the "Configure required applications" is not set to "yes" or all new applications are not on the list, this is a finding.
Configure the MAS Server to enable all required audit events: Failure to push a new application on a managed mobile device. On the MaaS360 Console complete the following Steps: 1. Navigate to Security >> Policies and select the mobile operating system (iOS, etc.) the MDM policy alerts apply to. 2. Open identified policy and go to device settings >> application compliance. 3. Set "Configure required applications" is set to "yes" and list all new applications 4. Repeat for other MOS as required (for example, Windows Phone, etc.)
Review the MaaS360 server console and confirm the server is configured to alert for audit event failures on managed mobile devices. On the MaaS360 Console complete the following Steps: 1. Navigate to Devices >> Groups 2. Have System Administrator identify one or more groups that alert for failure to update an existing application on a managed mobile device. 3. Select "edit" for one of the identified groups and verify that the two conditions exist: Condition 1: "Software Installed", "Application Name", "Contains", "<Name of Application>" Condition 2: "Software Installed", "Full Version", "Contains","<latest version of Application>" 4. Navigate to Security >> Compliance Rules 5. Have System Administrator identify one or more Rule Set Names that alert for failure to update an existing application on a managed mobile device. 6. Open Rule Set Name and select Enforcement Rules. 7. Verify that Application Compliance is enabled and "Alert" is selected for Enforcement Action 8. Then go to Group Based Rules and verify that the rule selected in Step 5 has been assigned to the group identified in Step 3. If two conditions in device group are not set correctly or application compliance is not enabled and set correctly in the rule set name or the rule is not assigned to the group, this is a finding.
Configure the MAS Server to enable all required audit events: Failure to update an existing application on a managed mobile device. On the MaaS360 Console complete the following Steps: 1. Navigate to Devices >> Groups 2. Select one or more groups that alert for failure to update an existing application on a managed mobile device. 3. Select "edit" for one of the identified groups and set the two conditions: Condition 1: "Software Installed", "Application Name", "Contains", "<Name of Application>" Condition 2: "Software Installed", "Full Version", "Contains","<latest version of Application>" 4. Navigate to Security >> Compliance Rules 5. Select one or more Rule Set Names that alert for failure to update an existing application on a managed mobile device. 6. Open Rule Set Name and select Enforcement Rules. 7. Set the Application Compliance to enabled and select "Alert" for Enforcement Action 8. Then go to Group Based Rules and assign the rule selected in Step 5 to the group identified in Step 3.
Review the MaaS360 server console and confirm that the MDM platform accounts are leveraged when users identify and authenticate themselves to the MaaS360 console. On the MaaS360 Console complete the following steps: 1. Navigate to Setup >> Login Settings 2. Verify "Configure Federated Single Sign-On" is checked and "Authenticate against Corporate User Directory" is selected 3. For SaaS deployments only verify the Cloud Extender is installed: Setup >> Cloud Extender and verify "Cloud Extender Online" is checked. If "Configure Federated Single Sign-On" and "Authenticate against Corporate User Directory" are not selected, this is a finding. For SaaS deployments if Cloud Extender is not installed or "Cloud Extender Online" is not checked, this is a finding.
Configure the MaaS360 Server to leverage the MDM Platform user accounts and groups for MaaS360 Server user identification and authentication. On the MaaS360 Console complete the following steps: 1. Navigate to Setup >> Login Settings 2. Select "Configure Federated Single Sign-On" and "Authenticate against Corporate User Directory" 3. For SaaS deployments only install the Cloud Extender: Setup >> Cloud Extender and select "Cloud Extender Online"
Review the implementation of the MaaS360 server with the site system administrator. Verify a host based firewall (for example HBSS) is installed on the Windows server. If the MaaS360 server is not protected by a DoD-approved firewall, this is a finding.
Protect the MaaS360 server with a DoD-approved firewall.
Review the implementation of the firewall protecting the MaaS360 server with the site system administrator. Verify the firewall is configured to restrict all network traffic to and from all addresses with the exception of ports, protocols, and IP address ranges required to support the MaaS360 server. If the firewall protecting the MaaS360 server is not configured to restrict all network traffic to and from all addresses with the exception of ports, protocols, and IP address ranges required to support the MaaS360 server, this is a finding. Note: Required ports, protocols, and IP address ranges for the MaaS360 MDM are found in the Supplemental document.
Configure the DoD-approved firewall to deny all except for ports listed in the STIG Supplemental document.
Review the MaaS360 server configuration to verify the MaaS360 agent alerts the MDM via the trusted channel to the MaaS360 Server for the following event: change in enrollment status. On the MaaS360 Console complete the following Steps: 1. Navigate to Security >> Compliance Rules 2. Have system administrator identify applicable "Change in enrollment status" rule set name 3. Select rule set name in list 4. Under Enforcement Rules, verify the "Enrollment" box is checked, "Trigger Action on Managed Status" (all boxes need to be checked), and "Enforcement Action" is set to "alert". 5. Navigate back to Security >> Compliance Rules and verify that rule set name has been designated as default (confirm check mark) and has "1" as precedence. If there is no "Change in enrollment status" rule set name setup or rules that have been setup are not configured correctly, this is a finding.
Configure the MaaS360 Agent to alert via the trusted channel to the MaaS360 Server for the following event: change in enrollment status On the MaaS360 Console complete the following Steps: 1. Navigate to Security >> Compliance Rules >> Add Rule Set and Create a rule 2. Under Basic Settings >> Select Applicable Platforms select the MOS and under "Event Notification Recipients" input the email for the non-compliant devices/users 3. Under Enforcement Rules >> Select Enforcement Rules ensure the "Enrollment" box is checked and the following boxes are checked: "Trigger Action on Managed Status" all boxes need to be checked, ensure "Enforcement Action" is set to "alert"
Interview ISSO and IBM MaaS360 MDM system administrator. Verify the site is not using the IBM MaaS360 V2 MDM or subscribing to a MaaS360 V2 MDM SaaS. If the site is using the IBM MaaS360 V2 MDM or subscribing to a MaaS360 V2 MDM SaaS, this is a finding.
Remove all versions of IBM MaaS360 V2 MDM or stop subscribing to a MaaS360 V2 MDM SaaS.