Samsung SDS EMM Security Technical Implementation Guide

Description

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected]

Details

Version / Release: V1R3

Published: 2022-06-10

Updated At: 2022-08-25 11:40:21

Compare/View Releases

Select any two versions of this STIG to compare the individual requirements

Select any old version/release of this STIG to view the previous requirements

Actions

Download

Filter

Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-225640r588007_rule SSDS-00-000010 CCI-000366 LOW The Samsung SDS EMM must implement functionality to generate an audit record of the following auditable events: c. [selection: Commands issued to the MDM Agent]. Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. For audit logs to be useful, administrators must have the ability to view them. SFR ID: FAU_GEN.1.1(1)
    SV-225641r588007_rule SSDS-00-000110 CCI-000366 MEDIUM The Samsung SDS EMM must be configured to communicate the following commands to the MDM Agent: read audit logs kept by the MD. Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. For audit logs to be useful, administrators must have the ability to view them. SFR ID: FMT_SMF.1.1(1) #19
    SV-225642r588007_rule SSDS-00-000470 CCI-000057 MEDIUM The Samsung SDS EMM or platform must be configured to initiate a session lock after a 15-minute period of inactivity. A session time-out lock is a temporary action taken when a user (MDM system administrator) stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporary nature of the absence. Rather
    SV-225643r588007_rule SSDS-00-000510 CCI-001851 MEDIUM The Samsung SDS EMM must be configured to transfer Samsung SDS EMM logs to another server for storage, analysis, and reporting. Note: Samsung SDS EMM logs include logs of MDM events and logs transferred to the Samsung SDS EMM by MDM agents of managed devices. Audit logs enable monitoring of security-relevant events and subsequent forensics when breaches occur. Since the Samsung SDS EMM has limited capability to store mobile device log files and perform analysis and reporting of mobile device log files, the Sam
    SV-225644r588007_rule SSDS-00-000530 CCI-000048 MEDIUM The Samsung SDS EMM must be configured to display the required DoD warning banner upon administrator logon. Note: This requirement is not applicable if the TOE platform is selected in FTA_TAB.1.1 in the Security Target (ST). Note: The advisory notice and consent warning message is not required if the general purpose OS or network device displays an advisory notice and consent warning message when the administrator logs on to the general purpose OS or network device prior to a
    SV-225645r588007_rule SSDS-00-000550 CCI-002696 MEDIUM The Samsung SDS EMM must be configured with a periodicity for reachable events of six hours or less for the following commands to the agent: - query connectivity status; - query the current version of the MD firmware/software; - query the current version of installed mobile applications; - read audit logs kept by the MD. Key security-related status attributes must be queried frequently so the Samsung SDS EMM can report status of devices under management to the administrator and management. The frequency of these queries must be configured to an acceptable timeframe. Six h
    SV-225646r588007_rule SSDS-00-000570 CCI-000366 MEDIUM The Samsung SDS EMM must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, auditor. Having several administrative roles for the Samsung SDS EMM supports separation of duties. This allows administrator-level privileges to be granted granularly, such as giving application management privileges to one group and security policy privileges to
    SV-225647r744409_rule SSDS-00-000640 CCI-000168 MEDIUM The Samsung SDS EMM must be configured to audit DoD or site-defined auditable events. Note: See VulDiscussion for a list of DoD required auditable events. Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident, or identify those responsible for one. Audit records can be generated from various components within the
    SV-225648r588007_rule SSDS-00-000670 CCI-000048 LOW The [selection: Samsung SDS EMM, MDM platform] must have the capability to display the DoD warning banner prior to establishing a user session. Display of the DoD-approved use notification before granting access to the application ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and
    SV-225649r744410_rule SSDS-00-000725 CCI-000015 HIGH The Samsung SDS EMM server must be configured to use one-time password in addition to username and password for administrator logon to the server. Two-factor authentication ensures strong authentication and access controls are in place for privileged accounts. But One-Time Passwords (OTP) do not meet DoD requirements that system administrators access privileged accounts via CAC authentication throug
    SV-225650r588007_rule SSDS-00-000740 CCI-000366 HIGH The Samsung SDS EMM server must be maintained at a supported version. Versions of Samsung SDS EMM are maintained by Samsung SDS for specific periods of time. Unsupported versions will not receive security updates for new vulnerabilities which leaves them subject to exploitation. SFR ID: FPT_TUD_EXT.1
    SV-225651r588007_rule SSDS-00-200010 CCI-000382 MEDIUM The Samsung SDS EMM platform must be protected by a DoD-approved firewall. Most information systems are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Unneeded services and processes provide
    SV-225652r588007_rule SSDS-00-200020 CCI-000382 MEDIUM The firewall protecting the Samsung SDS EMM platform must be configured to restrict all network traffic to and from all addresses with the exception of ports, protocols, and IP address ranges required to support Samsung SDS EMM and platform functions. Most information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations. Since Samsung SDS EMM is a critical c
    SV-225653r588007_rule SSDS-00-200030 CCI-000382 MEDIUM The firewall protecting the Samsung SDS EMM platform must be configured so that only DoD-approved ports, protocols, and services are enabled. See the DoD Ports, Protocols, Services Management [PPSM] Category Assurance Levels [CAL] list for DoD-approved ports, protocols, and services. All ports, protocols, and services used on DoD networks must be approved and registered via the DoD PPSM process. This is to ensure that a risk assessment has been completed before a new port, protocol, or service is configured on a DoD network and has be
    SV-225654r835013_rule SSDS-00-200070 CCI-000054 MEDIUM The Samsung SDS EMM must limit the number of concurrent sessions to one session for all accounts and/or account types. Application management includes the ability to control the number of users and user sessions that utilize an application. Limiting the number of allowed users and sessions per user is helpful in limiting risks related to DoS attacks. This requirement may
    SV-225655r588007_rule SSDS-00-200240 CCI-000017 MEDIUM The Samsung SDS EMM must automatically disable accounts after a 35 day period of account inactivity (local accounts). Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an application. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Applications need t
    SV-225656r588007_rule SSDS-00-200250 CCI-000044 MEDIUM The Samsung SDS EMM must enforce the limit of three consecutive invalid logon attempts by a user. By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the account. SFR ID: FMT_SMF.1(2)b. / IA-7-a Satisfies: SRG-A
    SV-225657r588007_rule SSDS-00-200260 CCI-000767 MEDIUM The Samsung SDS EMM must use multifactor authentication for local access to privileged accounts. To ensure accountability and prevent unauthenticated access, privileged users must use multifactor authentication to prevent potential misuse and compromise of the system. Multifactor authentication is defined as using two or more factors to achieve aut
    SV-245525r744387_rule SSDS-00-000710 CCI-000015 HIGH The Samsung SDS EMM must be configured to leverage the MDM platform administrator accounts and groups for Samsung SDS EMM user identification and CAC authentication. A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring attention are consistently and promptly addressed. If an attacker compromises an account, the entire MDM server infrastructure is at r
    SV-245526r744388_rule SSDS-00-000720 CCI-000015 HIGH Authentication of MDM platform accounts must be configured so they are implemented via an enterprise directory service. A comprehensive account management process that includes automation helps to ensure the accounts designated as requiring attention are consistently and promptly addressed. If an attacker compromises an account, the entire MDM server infrastructure is at r
    SV-245527r744391_rule SSDS-00-200150 CCI-000205 MEDIUM The Samsung SDS EMM local accounts password must be configured with length of 15 characters. The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and b
    SV-245528r836815_rule SSDS-00-200210 CCI-000174 MEDIUM The Samsung SDS EMM local accounts must be configured with password maximum lifetime of 60 Days. Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals. One method of minimizing this risk is to use complex passwords and periodically change them. If the application does not lim
    SV-245529r836816_rule SSDS-00-200220 CCI-000200 MEDIUM The Samsung SDS EMM local accounts must prohibit password reuse for a minimum of five generations. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If