Jamf Pro v10.x EMM Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +30 −30
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 30
- V-241790 Medium When the Jamf Pro EMM server cannot establish a connection to determine the validity of a certificate, the server must not have the option to accept the certificate.
- V-241791 Medium The Jamf Pro EMM server or platform must be configured to initiate a session lock after a 15-minute period of inactivity.
- V-241792 Medium The Jamf Pro EMM server must be configured with an enterprise certificate for signing policies (if function is not automatically implemented during Jamf Pro EMM server install).
- V-241793 Medium The Jamf Pro EMM server must be configured to transfer Jamf Pro EMM server logs to another server for storage, analysis, and reporting. Note: Jamf Pro EMM server logs include logs of MDM events and logs transferred to the Jamf Pro EMM server by MDM agents of managed devices.
- V-241794 Low The Jamf Pro EMM server must be configured to display the required DoD warning banner upon administrator logon. Note: This requirement is not applicable if the TOE platform is selected in FTA_TAB.1.1 in the Security Target (ST).
- V-241795 Medium The Jamf Pro EMM server must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, auditor.
- V-241796 Medium The Jamf Pro EMM server must be configured to leverage the MDM platform user accounts and groups for Jamf Pro EMM server user identification and CAC authentication.
- V-241797 Medium Authentication of Jamf Pro EMM server accounts must be configured so they are implemented either via an Authentication Gateway Service (AGS) which connects to the site DoD Identity Access Management (IdAM) environment that utilizes CAC authentication or via strong password controls for the administrator local accounts.
- V-241798 High Jamf Pro EMM must be maintained at a supported version.
- V-241799 Medium The default mysql_secure_installation must be installed.
- V-241800 Medium A unique database name and a unique MySQL user with a secure password must be created for use in Jamf Pro EMM.
- V-241801 Medium Separate MySQL user accounts with limited privileges must be created within Jamf Pro EMM.
- V-241802 Medium MySQL database backups must be scheduled in Jamf Pro EMM.
- V-241803 Medium The MySQL DatabasePassword key must be removed or set to a blank value in the database configuration file in Jamf Pro EMM.
- V-241804 Medium The Jamf Pro EMM local accounts password must be configured with length of 15 characters.
- V-241805 Medium The Jamf Pro EMM local accounts must be configured with at least one lowercase character.
- V-241806 Medium The Jamf Pro EMM local accounts must be configured with at least one uppercase character.
- V-241807 Medium The Jamf Pro EMM local accounts must be configured with at least one number.
- V-241808 Medium The Jamf Pro EMM local accounts must be configured with at least one special character.
- V-241809 Medium The Jamf Pro EMM local accounts must be configured with password minimum lifetime of 24 hours.
- V-241810 Medium The Jamf Pro EMM local accounts must be configured with password maximum lifetime of 3 months.
- V-241811 Medium The Jamf Pro EMM local accounts must prohibit password reuse for a minimum of five generations.
- V-241812 Medium The Jamf Pro EMM must automatically disable accounts after a 35 day period of account inactivity (local accounts).
- V-241813 Medium The Jamf Pro EMM must enforce the limit of three consecutive invalid logon attempts by a user.
- V-241814 Medium The Jamf Pro EMM server platform must be protected by a DoD-approved firewall.
- V-241815 Medium The firewall protecting the Jamf Pro EMM server platform must be configured to restrict all network traffic to and from all addresses with the exception of ports, protocols, and IP address ranges required to support Jamf Pro EMM server and platform functions.
- V-241816 Medium The firewall protecting the Jamf Pro EMM server platform must be configured so that only DoD-approved ports, protocols, and services are enabled. (See the DoD Ports, Protocols, Services Management [PPSM] Category Assurance Levels [CAL] list for DoD-approved ports, protocols, and services).
- V-241817 Medium All Jamf Pro EMM server local accounts created during application installation and configuration must be disabled.
- V-241818 High The Jamf Pro EMM server must connect to [Authentication Gateway Service (AGS)] with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.
- V-257255 Medium The Jamf Pro EMM server must configure the MDM Agent/platform to enable the DOD required device enrollment restrictions allowed for enrollment [specific device model].
Removed rules 30
- V-99567 Medium When the Jamf Pro EMM server cannot establish a connection to determine the validity of a certificate, the server must not have the option to accept the certificate.
- V-99569 Medium The Jamf Pro EMM server must configure the MDM Agent/platform to enable the DoD required device enrollment restrictions allowed for enrollment [specific device model].
- V-99571 Medium The Jamf Pro EMM server or platform must be configured to initiate a session lock after a 15-minute period of inactivity.
- V-99573 Medium The Jamf Pro EMM server must be configured with an enterprise certificate for signing policies (if function is not automatically implemented during Jamf Pro EMM server install).
- V-99575 Medium The Jamf Pro EMM server must be configured to transfer Jamf Pro EMM server logs to another server for storage, analysis, and reporting. Note: Jamf Pro EMM server logs include logs of MDM events and logs transferred to the Jamf Pro EMM server by MDM agents of managed devices.
- V-99577 Low The Jamf Pro EMM server must be configured to display the required DoD warning banner upon administrator logon. Note: This requirement is not applicable if the TOE platform is selected in FTA_TAB.1.1 in the Security Target (ST).
- V-99579 Medium The Jamf Pro EMM server must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, auditor.
- V-99581 Medium The Jamf Pro EMM server must be configured to leverage the MDM platform user accounts and groups for Jamf Pro EMM server user identification and CAC authentication.
- V-99583 Medium Authentication of Jamf Pro EMM server accounts must be configured so they are implemented either via an Authentication Gateway Service (AGS) which connects to the site DoD Identity Access Management (IdAM) environment that utilizes CAC authentication or via strong password controls for the administrator local accounts.
- V-99585 Medium The Jamf Pro EMM server platform must be protected by a DoD-approved firewall.
- V-99587 Medium The firewall protecting the Jamf Pro EMM server platform must be configured to restrict all network traffic to and from all addresses with the exception of ports, protocols, and IP address ranges required to support Jamf Pro EMM server and platform functions.
- V-99589 Medium The firewall protecting the Jamf Pro EMM server platform must be configured so that only DoD-approved ports, protocols, and services are enabled. (See the DoD Ports, Protocols, Services Management [PPSM] Category Assurance Levels [CAL] list for DoD-approved ports, protocols, and services).
- V-99591 Medium The Jamf Pro EMM server must connect to [Authentication Gateway Service (AGS)] with an authenticated and secure (encrypted) connection to protect the confidentiality and integrity of transmitted information.
- V-99593 Medium All Jamf Pro EMM server local accounts created during application installation and configuration must be disabled.
- V-99597 High Jamf Pro EMM must be maintained at a supported version.
- V-99599 Medium The default mysql_secure_installation must be installed.
- V-99601 Medium A unique database name and a unique MySQL user with a secure password must be created for use in Jamf Pro EMM.
- V-99603 Medium Separate MySQL user accounts with limited privileges must be created within Jamf Pro EMM.
- V-99605 Medium MySQL database backups must be scheduled in Jamf Pro EMM.
- V-99607 Medium The MySQL DatabasePassword key must be removed or set to a blank value in the database configuration file in Jamf Pro EMM.
- V-99609 Medium The Jamf Pro EMM local accounts password must be configured with length of 15 characters.
- V-99611 Medium The Jamf Pro EMM local accounts must be configured with at least one lowercase character.
- V-99613 Medium The Jamf Pro EMM local accounts must be configured with at least one uppercase character.
- V-99615 Medium The Jamf Pro EMM local accounts must be configured with at least one number.
- V-99617 Medium The Jamf Pro EMM local accounts must be configured with at least one special character.
- V-99619 Medium The Jamf Pro EMM local accounts must be configured with password minimum lifetime of 24 hours.
- V-99621 Medium The Jamf Pro EMM local accounts must be configured with password maximum lifetime of 3 months.
- V-99623 Medium The Jamf Pro EMM local accounts must prohibit password reuse for a minimum of five generations.
- V-99625 Medium The Jamf Pro EMM must automatically disable accounts after a 35 day period of account inactivity (local accounts).
- V-99627 Medium The Jamf Pro EMM must enforce the limit of three consecutive invalid logon attempts by a user.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- JAMF-10-000040
- Vuln IDs
-
- V-241790
- V-99567
- Rule IDs
-
- SV-241790r879612_rule
- SV-108671
Checks: C-45066r685122_chk
Validate the Jamf Pro EMM server has been configured to not accept a certificate if the certificate cannot be validated. 1. Open the Jamf Pro EMM console. 2. Open "Settings". 3. Select "User-Initiated Enrollment". 4. Under the General tab, verify "Use a third-party signing certificate" is selected. 5. Verify the name and certificate extension of the DoD p12 certificate is listed. If the Jamf Pro EMM server has been not been configured to not accept a certificate if the certificate cannot be validated, this is a finding.
Fix: F-45025r685123_fix
Configure the Jamf Pro EMM server to not accept a certificate if the certificate cannot be validated. 1. Open the Jamf Pro EMM console. 2. Open "Settings". 3. Select "User-Initiated Enrollment". 4. Under the General tab, select "Use a third-party signing certificate". 5. Drag and drop the DoD p12 certificate. 6. Click "Save".
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- JAMF-10-000460
- Vuln IDs
-
- V-241791
- V-99571
- Rule IDs
-
- SV-241791r879513_rule
- SV-108675
Checks: C-45067r685125_chk
Verify the Jamf Pro EMM server or platform is configured to initiate a session lock after a 15-minute period of inactivity. Review the variable in the Jamf Pro web.xml file. On the Jamf Pro host server, open the web.xml file: If using macOS, the web.xml file is located at the following filepath: /Library/JSS/Tomcat/webapps/ROOT/WEB-INF/ If using Windows, the web.xml file is located at the following filepath: C:\Program Files\JSS\Tomcat\webapps\ROOT\WEB-INF\ If using Linux, the web.xml file is located at the following filepath: /usr/local/jss/tomcat/webapps/ROOT/WEB-INF/ Locate the following setting: <session-config> <session-timeout>15</session-timeout> </session-config> Ensure that the code is not commented out. If the code is commented out, remove the comment tags <!-- --> that encase the code. Note: Session timeout is in minutes. If the code is commented out or session-timeout is not configured to "15" minutes or less, this is a finding.
Fix: F-45026r685126_fix
Perform the following procedure to configure the Jamf session lock to lock after a 15-minute period of inactivity. Configuring the Variable in the JAMF web.xml File On the Jamf Pro EMM host server, open the web.xml file: If using macOS, the web.xml file is located at the following filepath: /Library/JSS/Tomcat/webapps/ROOT/WEB-INF/ If using Windows, the web.xml file is located at the following filepath: C:\Program Files\JSS\Tomcat\webapps\ROOT\WEB-INF\ If using Linux, the web.xml file is located at the following filepath: /usr/local/jss/tomcat/webapps/ROOT/WEB-INF/ Locate the following setting: <session-config> <session-timeout>1</session-timeout> </session-config> Ensure that the code is not commented out. If the code is commented out, remove the comment tags <!-- --> that encase the code. Modify the session-timeout to a value from 1 to 15. Note: Session timeout is in minutes. Restart Tomcat after modifying anything within the web.xml file. See Starting and Stopping Tomcat for instructions in the Jamf admin guide.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JAMF-10-000480
- Vuln IDs
-
- V-241792
- V-99573
- Rule IDs
-
- SV-241792r879887_rule
- SV-108677
Checks: C-45068r685128_chk
Verify Jamf Pro is utilizing an External CA for signing communication to mobile devices: 1. Open Jamf Pro server. 2. Open "Settings". 3. Select "PKI Certificates". 4. Select "Management Certificate Template". 5. Select "External CA" tab. 6. Verify the "Use a SCEP-enabled external CA for computer and mobile device enrollment" is enabled. 7. Verify that the Signing Certificate is listed at the bottom of the page. If these settings are confirmed, Jamf Pro is set to use an external CA. If Jamf Pro is not configured to use an External CA for signing communication to mobile devices, this is a finding.
Fix: F-45027r685129_fix
Configure the following settings within the Jamf Pro EMM server for ensuring an authorized DoD certificate is used for signing enrollment and configuration profiles: 1. Open Jamf Pro server. 2. Open "Settings". 3. Open "PKI Certificates". 4. Select "Management Certificate Template" tab. 5. Select "External CA" tab. 6. Select "Edit". 7. Select to use SCEP-enabled external CA for computer and mobile device enrollment. 8. Enter all the applicable settings to connect this server to SCEP/Entrust enabled CA. 9. Select "Save". 10. At the bottom of the External CA screen, select "Change Signing and CA Certificates". 11. Follow onscreen instructions to upload the signing and CA certificates for Jamf Pro to use. Jamf Pro is now set to use an External CA for signing all communication to mobile devices.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- JAMF-10-000520
- Vuln IDs
-
- V-241793
- V-99575
- Rule IDs
-
- SV-241793r879731_rule
- SV-108679
Checks: C-45069r685131_chk
Verify the Jamf Pro EMM server is enabled to push syslog: 1. Open Jamf Pro server. 2. Open "Settings". 3. Select "Change Management". 4. Verify the settings for Syslog Server (log file transfer to the syslog server). If the Jamf Pro EMM server is not configured to enable syslog, this is a finding.
Fix: F-45028r685132_fix
Configure the Jamf Pro EMM server to enable syslog: 1. Open Jamf Pro server. 2. Open "Settings". 3. Select "Change Management". 4. Click "Edit". 5. Configure the settings for Syslog Server. 6. Click "Save".
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- JAMF-10-000550
- Vuln IDs
-
- V-241794
- V-99577
- Rule IDs
-
- SV-241794r879547_rule
- SV-108681
Checks: C-45070r685134_chk
Verify the Jamf Pro EMM server for customized login page: Go to /path/to/JSS/Tomcat/webapps/ROOT/WEB-INF/frontend folder. Find the login.jsp. Locate new <body> content related to customized text for DoD classification. Verify the DoD warning banner text is correct. If the Jamf Pro EMM server is not configured to display DoD warning banner when the system administrator logs on to the server, this is a finding.
Fix: F-45029r685135_fix
Configure the Jamf Pro EMM server for customized login page: Go to /path/to/JSS/Tomcat/webapps/ROOT/WEB-INF/frontend>>Open the login.jsp with a text editor application. Scroll to the bottom of the page by the line "<input type="submit" class="button" value="log in" />" Under the </div> create a new line and paste the following: NOTE: Anything under "style" and "body" can be customized to fit your environments needs.<head> <style> p {margin-top:1em} p {margin-bottom:0em} p {color:red} p {text-align:center} p {font-family:courier} p {font-size:100%} </style> </head> <body> <p>""Place DoD warning banner first line here""</p> <p>""place second (or next) line here""</p> </body> Restart Tomcat for changes to take effect.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JAMF-10-000610
- Vuln IDs
-
- V-241795
- V-99579
- Rule IDs
-
- SV-241795r879887_rule
- SV-108683
Checks: C-45071r685137_chk
Administrator and Audit level permission groups are configured by default within Jamf Pro server. Verify the additional group permissions by: 1. Open Jamf Pro server. 2. Open "Settings". 3. Select "Jamf Pro User Accounts and Groups". 4. View the necessary information for each group has been created with appropriate privilege sets. Jamf Pro EMM server will have the appropriate group level permissions available for applying to individual user accounts or AD groups. If required administrator roles have not been set up on the server, this is a finding.
Fix: F-45030r685138_fix
Administrator and Audit level permission groups are configured by default within Jamf Pro server. Configure the additional group permissions by: 1. Open Jamf Pro server. 2. Open "Settings". 3. Select "Jamf Pro User Accounts and Groups". 4. Select "New". 5. Select "Create Standard Group", click "Next". 6. Fill out all the necessary information for creating the group including the privilege set. 7. Click "Save". 8. Repeat for each group of permissions that are needed. Once completed, Jamf Pro EMM server will have the appropriate group level permissions available for applying to individual user accounts or AD groups.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- JAMF-10-000670
- Vuln IDs
-
- V-241796
- V-99581
- Rule IDs
-
- SV-241796r879522_rule
- SV-108685
Checks: C-45072r685140_chk
Interview the site ISSM. Determine if the site has connected Jamf Pro EMM to an Authentication Gateway Service (AGS) which connects to the DoD Identity Access Management (IdAM) environment that uses CAC authentication. - If YES, verify the AGS implementation has been reviewed using the Application Layer Gateway SRG. Verify the Jamf Pro EMM server is configured to connect to the AGS: 1. Go to the server console. 2. Open "Settings". 3. Select "SSO" (Single Sign-on). 4. Verify Single Sign-on Authentication is enabled and connection to the AGS using SAML-based protocol is set up. - If NO, verify strong password controls for the administrator local accounts are in place. (Verified by JAMF-10-100700 to JAMF-10-100820.) If Jamf Pro EMM is not connected Jamf Pro EMM to an Authentication Gateway Service (AGS) which connects to your DoD Identity Access Management (IdAM) environment that utilizes CAC authentication or has not been configured to use strong password controls for the administrator local accounts, this is a finding.
Fix: F-45031r685141_fix
Implement one of the following options: Option #1. Connect Jamf Pro EMM to an Authentication Gateway Service (AGS) which connects to the DoD Identity Access Management (IdAM) environment that uses CAC authentication. Note: Jamf requires AGS to support SAML. - Set up AGS / IdAM environment. - Connect the Jamf pro EMM to the AGS: 1. Open "Settings". 2. Select "SSO" (Single Sign-on). 3. Select "Edit". 4. Enable Single Sign-on Authentication. 5. Complete the appropriate settings to connect Jamf Pro EMM to the AGS using SAML-based protocol. 6. Click "Save". Note: If Option #1 is used, requirements JAMF-10-100700 to JAMF-10-10820 are Not Applicable and requirement JAMF-10-200040 is Applicable - Configurable. Option #2. Implement strong password policy for admin local accounts. Configure the server password policy (JAMF-10-100700 to JAMF-10-10820). Note: If Option #2 is used, requirement JAMF-10-200040 is Not Applicable.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- JAMF-10-000685
- Vuln IDs
-
- V-241797
- V-99583
- Rule IDs
-
- SV-241797r879887_rule
- SV-108687
Checks: C-45073r685143_chk
Interview the site ISSM. Determine if the site has connected Jamf Pro EMM to an Authentication Gateway Service (AGS) which connects to the DoD Identity Access Management (IdAM) environment that uses CAC authentication. - If YES, verify the AGS implementation has been reviewed using the Application Layer Gateway SRG. Verify the Jamf Pro EMM server is configured to connect to the AGS: 1. Go to the server console. 2. Open "Settings". 3. Select "SSO" (Single Sign-on). 4. Verify Single Sign-on Authentication is enabled and connection to the AGS using SAML-based protocol is set up. - If NO, verify strong password controls for the administrator local accounts are in place. (Verified by JAMF-10-100700 to JAMF-10-100820.) If Jamf Pro EMM is not connected to an Authentication Gateway Service (AGS) which connects to the DoD Identity Access Management (IdAM) environment that uses CAC authentication or has not been configured to use strong password controls for the administrator local accounts, this is a finding.
Fix: F-45032r685144_fix
Implement one of the following options: Option #1. Connect Jamf Pro EMM to an Authentication Gateway Service (AGS) which connects to the DoD Identity Access Management (IdAM) environment that uses CAC authentication. Note: Jamf requires AGS to support SAML. - Set up AGS/IdAM environment. - Connect the Jamf pro EMM to the AGS: 1. Open "Settings". 2. Select "SSO" (Single Sign-on). 3. Select "Edit". 4. Enable Single Sign-on Authentication. 5. Complete the appropriate settings to connect Jamf Pro EMM to the AGS using SAML-based protocol. 6. Click "Save". Note: If Option #1 is used, requirements JAMF-10-100700 to JAMF-10-10820 are Not Applicable and requirement JAMF-10-200040 is Applicable - Configurable. Option #2. Implement strong password policy for admin local accounts. Configure the server password policy (JAMF-10-100700 to JAMF-10-10820). Note: If Option #2 is used, requirement JAMF-10-200040 is Not Applicable.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- JAMF-10-000700
- Vuln IDs
-
- V-241798
- V-99597
- Rule IDs
-
- SV-241798r879887_rule
- SV-108701
Checks: C-45074r685146_chk
Verify the installed version of Jamf Pro EMM is currently supported. On the Jamf Pro console do the following to determine the version number of the server: 1. Log in to the console. 2. View the version number listed in the upper left corner. List of current supported versions: v10.18 (End of Support Date: TBD v10.17 (TBD) v10.16 (TBD) v10.15 (TBD) v10.14 (TBD) v10.13.1 (TBD) If the displayed Jamf Pro server version is not currently supported or is not a newer version than on the list above, this is a finding.
Fix: F-45033r685147_fix
Update the Jamf Pro EMM to a supported version (see list below) or newer version. v10.18 (End of Support Date: TBD v10.17 (TBD) v10.16 (TBD) v10.15 (TBD) v10.14 (TBD) v10.13.1 (TBD)
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- JAMF-10-100060
- Vuln IDs
-
- V-241799
- V-99599
- Rule IDs
-
- SV-241799r879887_rule
- SV-108703
Checks: C-45075r685149_chk
Verify the mysql_secure_installation has been installed on the Jamf host server. 1. Log in to MySQL. Execute the "show databases;" command. - Verify that the database named "Test" is not shown in output of the command. 2. Verify the root account has a string representing the password and not a blank value. - select * from mysql.user; 3. Verify the anonymous users have been removed and verify the user field contains a user name. - select * from mysql.user; All three steps must be correct to indicate mysql_secure_installation has been executed. If the mysql_secure_installation has not been installed on the Jamf host server, this is a finding.
Fix: F-45034r685150_fix
Install the mysql_secure_installation. 1. Install MySQL. 2. Using the Jamf Pro Security Recommendations document, go to the path based on the host operating system and execute the appropriate mysql_secure_installation script.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- JAMF-10-100080
- Vuln IDs
-
- V-241800
- V-99601
- Rule IDs
-
- SV-241800r879887_rule
- SV-108705
Checks: C-45076r685152_chk
Verify a unique database name and a unique MySQL user with a secure password have been created for use in Jamf Pro EMM. 1. Execute the show databases command. - Ensure at least one database name other than the default databases exits. The default databases are: infomation_schema mysql performance_schema sys 2. Verify there is a unique MySQL user. - In MySQL, run select * mysql.user; - Look for a user that is not Root or one of the other MySQL service accounts. Both of these steps must be correct. If a unique database name and a unique MySQL user with a secure password have not been created, this is a finding.
Fix: F-45035r685153_fix
Create a unique database name and a unique MySQL user with a secure password. The procedure is found in the following Jamf Knowledge Base article: https://www.jamf.com/jamf-nation/articles/542/title
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JAMF-10-100100
- Vuln IDs
-
- V-241801
- V-99603
- Rule IDs
-
- SV-241801r879887_rule
- SV-108707
Checks: C-45077r685155_chk
Verify separate MySQL user accounts with limited privileges have been created within Jamf Pro EMM. In MySQL, execute the following command: show grants for username@localhost; Verify the privileges match what is in the Jamf Knowledge Base article. If separate MySQL user accounts with limited privileges have not been created within Jamf Pro EMM, this is a finding.
Fix: F-45036r685156_fix
Create separate MySQL user accounts with limited privileges within Jamf Pro EMM. The procedures for creating user accounts and assigning account privileges are found in the following Jamf Knowledge Base articles: MySQL 8.0: https://dev.mysql.com/doc/refman/8.0/en/creating-accounts.html MySQL 5.7: https://dev.mysql.com/doc/refman/5.7/en/creating-accounts.html Following is a list MySQL privileges that are required for different types of environments: - For a standalone web application or the master node in clustered environments: INSERT, SELECT, UPDATE, DELETE, CREATE, DROP, ALTER, INDEX, LOCK TABLES - For a child node in clustered environments: INSERT, SELECT, UPDATE, DELETE, DROP, LOCK TABLES - To view connections from cluster nodes with different MySQL users: PROCESS Note: The "PROCESS" privilege requires the use of "*.*".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JAMF-10-100110
- Vuln IDs
-
- V-241802
- V-99605
- Rule IDs
-
- SV-241802r879887_rule
- SV-108709
Checks: C-45078r685158_chk
Verify MySQL of database backups have been scheduled in Jamf Pro EMM. 1. Open "Jamf Server Tools". 2. Click "Scheduled Backups" in the sidebar. 3. Verify backups are scheduled. If MySQL of database backups have not been scheduled in Jamf Pro EMM, this is a finding.
Fix: F-45037r685159_fix
Schedule MySQL of database backups in Jamf Pro EMM. The procedure is found in the following Jamf Knowledge Base article: https://www.jamf.com/jamf-nation/articles/579/title
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- JAMF-10-100120
- Vuln IDs
-
- V-241803
- V-99607
- Rule IDs
-
- SV-241803r879887_rule
- SV-108711
Checks: C-45079r685161_chk
Verify the MySQL <DatabasePassword> key has been removed or set to a blank value in Jamf Pro EMM. 1. On the Jamf Pro server, navigate to the JSS/Tomcat/webapps/ROOT/WEB-INF/xml. 2. Find the "Database.xml" file and open it in a text editor. 3. Find the <DatabasePassword>. 4. Verify that there is no password. If the MySQL <DatabasePassword> key has not been removed or not set to a blank value, this is a finding.
Fix: F-45038r685162_fix
Remove the MySQL <DatabasePassword> key or set to a blank value in Jamf Pro EMM. If the database password is removed from the configuration file, the database password must be entered manually for the Jamf Pro EMM server web app during startup. In a clustered environment, the database password must be entered manually for each individual node. Note: Default values are included below for reference only. Use unique values in production environments. <Database> ... <DatabaseName>jamfsoftware</DatabaseName> <DatabaseUser>jamfsoftware</DatabaseUser> <DatabasePassword></DatabasePassword> ... </Database>
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- JAMF-10-100700
- Vuln IDs
-
- V-241804
- V-99609
- Rule IDs
-
- SV-241804r879887_rule
- SV-108713
Checks: C-45080r685164_chk
To verify the length of the local accounts password, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Verify "Minimum Password Length" is set to "15". If the "Minimum Password Length" is not set to "15", this is a finding.
Fix: F-45039r685165_fix
To configure the length of the local accounts password, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Click "Edit". 7. Set "Minimum Password Length" to "15".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- JAMF-10-100710
- Vuln IDs
-
- V-241805
- V-99611
- Rule IDs
-
- SV-241805r879887_rule
- SV-108715
Checks: C-45081r685167_chk
To verify the "Require lowercase character" of the local accounts password is selected, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Verify "Require lowercase character" is selected. If "Require lowercase character" is not selected, this is a finding.
Fix: F-45040r685168_fix
To configure the "Require lowercase character" of the local accounts password, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Click "Edit". 7. Select "Require lowercase character"
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- JAMF-10-100720
- Vuln IDs
-
- V-241806
- V-99613
- Rule IDs
-
- SV-241806r879887_rule
- SV-108717
Checks: C-45082r685170_chk
To verify the "Require uppercase character" of the local accounts password is selected, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Verify "Require uppercase character" is selected. If "Require uppercase character" is not selected, this is a finding.
Fix: F-45041r685171_fix
To configure the "Require uppercase character" of the local accounts password, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Click "Edit". 7. Select "Require uppercase character".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- JAMF-10-100730
- Vuln IDs
-
- V-241807
- V-99615
- Rule IDs
-
- SV-241807r879887_rule
- SV-108719
Checks: C-45083r685173_chk
To verify the "Require number" of the local accounts password is selected, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Verify "Require number" is selected. If "Require number" is not selected, this is a finding.
Fix: F-45042r685174_fix
To configure the "Require number" of the local accounts password, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Click "Edit". 7. Select "Require number".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- JAMF-10-100740
- Vuln IDs
-
- V-241808
- V-99617
- Rule IDs
-
- SV-241808r879887_rule
- SV-108721
Checks: C-45084r685176_chk
To verify the "Require special character" of the local accounts password is selected, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Verify "Require special character" is selected. If "Require special character" is not selected, this is a finding.
Fix: F-45043r685177_fix
To configure the "Require special character" of the local accounts password, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Click "Edit". 7. Select "Require special character".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- JAMF-10-100750
- Vuln IDs
-
- V-241809
- V-99619
- Rule IDs
-
- SV-241809r879887_rule
- SV-108723
Checks: C-45085r685179_chk
To verify the "Minimum password Age" of "1" day for the local accounts password is set, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Verify "Minimum Password Age" is set to "1" day. If the "Minimum Password Age" is not set to "1" day, this is a finding.
Fix: F-45044r685180_fix
To configure the "Minimum Password Age" to "1" day for the local accounts password, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Click "Edit". 7. Set the "Minimum Password Age" to "1" day.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000174
- Version
- JAMF-10-100770
- Vuln IDs
-
- V-241810
- V-99621
- Rule IDs
-
- SV-241810r879887_rule
- SV-108725
Checks: C-45086r685182_chk
To verify the "password maximum lifetime" of "3" months for the local account's password is set, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Verify "password maximum lifetime" of "3" months. If the "password maximum lifetime" for local account's password is not set to "3" months, this is a finding.
Fix: F-45045r685183_fix
To configure the "password maximum lifetime" of "3" months for the local account's password, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Click "Edit". 7. Set the "password maximum lifetime" of "3" months.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- JAMF-10-100780
- Vuln IDs
-
- V-241811
- V-99623
- Rule IDs
-
- SV-241811r879887_rule
- SV-108727
Checks: C-45087r685185_chk
To verify the local accounts "Password History" is set to a minimum of "5" generations, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Verify "Password History" to "5" or more. If "Password History" is not set to "5" or more, this is a finding.
Fix: F-45046r685186_fix
Note: This requirement is NA if Option #1 is selected in requirement JAMF-10-000685. To configure the "Password History" of the local accounts password to a minimum of "5" generations, do the following: 1. Open the Jamf Pro EMM console. 2. Click "Settings". 3. Click "System Settings". 4. Click "Jamf Pro System User Accounts & Groups". 5. Click "Password Policy". 6. Set the "Password History" to "5" or more.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000017
- Version
- JAMF-10-100800
- Vuln IDs
-
- V-241812
- V-99625
- Rule IDs
-
- SV-241812r879887_rule
- SV-108729
Checks: C-45088r685188_chk
Interview the site Jamf Pro EMM system administrator. Confirm a script is used to periodically check when each local account was last accessed by the user and disable the account if there is a 35-day or more period of account inactivity. If a script is not used to periodically check when each local account was last accessed by the user and disable the account or if there is a 35-day or more period of account inactivity, this is a finding.
Fix: F-45047r685189_fix
Note: There is no setting on the Jamf Pro EMM console to implement this requirement. A script should be used to periodically check when each local account was last accessed by the user and disable the account if there is a 35-day or more period of account inactivity. The script should be developed by the site or provided by Jamf.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- JAMF-10-100810
- Vuln IDs
-
- V-241813
- V-99627
- Rule IDs
-
- SV-241813r879887_rule
- SV-108731
Checks: C-45089r685191_chk
To verify the Jamf Pro EMM enforces a limit of three consecutive invalid logon attempts by a user, do the following: 1. Log in to the Jamf Pro EMM console. 2. Open "Settings". 3. Select "Jamf Pro User Accounts & Groups". 4. Select "Password Policy" in the upper right corner. 5. Verify that under "Account Lockout" the number of failed attempts before lockout is set to "3" or less. If the Jamf Pro EMM does not limit the number of consecutive invalid logon attempts by a user to "3" or less, this is a finding.
Fix: F-45048r685192_fix
To configure the Jamf Pro EMM server to lock after three consecutive invalid logon attempts by a user, do the following: 1. Open "Settings". 2. Select "Jamf Pro User Accounts & Groups". 3. Select “Password Policy” in the upper right corner. 4. Select "Edit". 5. Under “Account Lockout”, select the drop-down menu to change the number of failed attempts before lockout to "3". 6. Select “Save”.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- JAMF-10-200010
- Vuln IDs
-
- V-241814
- V-99585
- Rule IDs
-
- SV-241814r879588_rule
- SV-108689
Checks: C-45090r685194_chk
Review the Jamf Pro EMM server platform configuration to determine whether a DoD-approved firewall is installed or if the platform operating system provides a firewall service that can restrict both inbound and outbound traffic by TCP/UDP port and IP address. If there is not a host-based firewall present on the Jamf Pro EMM server platform, this is a finding.
Fix: F-45049r685195_fix
Install a DoD-approved firewall on the Jamf Pro EMM server.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- JAMF-10-200020
- Vuln IDs
-
- V-241815
- V-99587
- Rule IDs
-
- SV-241815r879588_rule
- SV-108691
Checks: C-45091r685197_chk
Ask the Jamf Pro EMM server administrator for a list of ports, protocols, and IP address ranges necessary to support Jamf Pro EMM server and platform functionality. A list can usually be found in the STIG Supplemental document or Jamf Pro EMM product documentation. Compare the list against the configuration of the firewall and identify discrepancies. If the host-based firewall is not configured to support only those ports, protocols, and IP address ranges necessary for operation, this is a finding.
Fix: F-45050r685198_fix
Configure the firewall on the Jamf Pro EMM server to only permit ports, protocols, and IP address ranges necessary for operation.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- JAMF-10-200030
- Vuln IDs
-
- V-241816
- V-99589
- Rule IDs
-
- SV-241816r879588_rule
- SV-108693
Checks: C-45092r685200_chk
Ask the Jamf Pro EMM server administrator for a list of ports, protocols, and services that have been configured on the host-based firewall of the Jamf Pro EMM server or generate the list by inspecting the firewall. Verify all allowed ports, protocols, and services are included on the DoD PPSM CAL list. If any allowed ports, protocols, and services on the Jamf Pro EMM server host-based firewall are not included on the DoD PPSM CAL list, this is a finding.
Fix: F-45051r685201_fix
Turn off any ports, protocols, and services on the Jamf Pro EMM server host-based firewall that are not on the DoD PPSM CAL list.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- JAMF-10-200040
- Vuln IDs
-
- V-241817
- V-99593
- Rule IDs
-
- SV-241817r879589_rule
- SV-108697
Checks: C-45093r685203_chk
Verify all local accounts on the Jamf Pro EMM server have been disabled. Note: the server service account is not disabled. 1. Log in to the Jamf pro EMM console. 2. Open "Settings". 3. Verify all Jamf Pro User Accounts & Groups have been disabled. If all local accounts on the Jamf Pro EMM server have not been disabled, this is a finding.
Fix: F-45052r685204_fix
Disable all local accounts on the Jamf Pro EMM server with the following procedure. Note: The server service account should not be disabled. 1. Open "Settings". 2. Select "Jamf Pro User Accounts & Groups". 3. Select the user/accounts that need to be disabled. 4. Upon selection, click on the "Edit" button. 5. Change the "Access Status" to "Disabled". 6. Click "Save". 7. Repeat steps 3-6 for all local accounts.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- JAMF-10-200065
- Vuln IDs
-
- V-241818
- V-99591
- Rule IDs
-
- SV-241818r916416_rule
- SV-108695
Checks: C-45094r685206_chk
Talk to the site Administrator to confirm the AGS has been configured to connect to the Jamf Pro EMM server using the TLS connection or confirm during a review of the AGS. If the AGS has not been configured to connect to the Jamf Pro EMM server using a TLS connection, this is a finding.
Fix: F-45053r685207_fix
Confirm the Administrator has configured the AGS to connect to the Jamf Pro EMM server using the TLS connection.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JAMF-10-000440
- Vuln IDs
-
- V-257255
- V-99569
- Rule IDs
-
- SV-257255r916639_rule
- SV-108673
Checks: C-60939r916636_chk
Verify device enrollment restrictions are set up to limit enrollment by iOS device. 1. Open Jamf Pro admin interface. 2. Select "Devices". 3. Select "Smart Device Groups". 4. Select desired device group. 5. Verify approved model numbers are listed. If device enrollment restrictions are not set up, this is a finding.
Fix: F-60881r916635_fix
Build Smart Device Group that matches DOD requirements and said groups are within exclusions of Configuration Profiles, Mobile Device Apps, etc. 1. Open Jamf Pro admin interface. 2. Select "Devices". 3. Select "Smart Device Groups". 4. Select "New". 5. Enter a name for the group. 6. Select "Criteria". 7. Select "Add" to add new Model, Model Identifier, or Model Number. 8. Continue to add all models that satisfy this requirement. 9. Select "Save". Add this Smart Device Group to any Configuration Profile, Mobile Device Apps as an Exception Scope.