UCF STIG Viewer Logo

Applications must prevent the installation of organization-defined critical software programs not signed with a certificate that has been recognized and approved by the organization.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35374 SRG-APP-000131-MAPP-NA SV-46661r1_rule Medium
Description
Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system. Accordingly, software defined by the organization as critical software may be signed with a certificate recognized and approved by the organization. Examples of critical software programs and/or modules include, for example, patches, service packs, software libraries and where applicable, device drivers. Rationale for non-applicability: This control is required in the MOS SRG. The operating system must control the installation of software to protect itself and other applications. Application enforcement mechanisms are vulnerable to breach by OS privileged processes.
STIG Date
Mobile Application Security Requirements Guide 2013-01-04

Details

Check Text ( C-43737r1_chk )
This requirement is NA for the MAPP SRG.
Fix Text (F-39920r1_fix)
The requirement is NA. No fix is required.