UCF STIG Viewer Logo

Configuration management solutions must track unauthorized, security-relevant configuration changes.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35386 SRG-APP-000139-MAPP-NA SV-46673r1_rule Medium
Description
Configuration settings are the configurable security-related parameters of information technology products that are part of the information system. Security-related parameters are those parameters impacting the security state of the system including parameters related to meeting other security control requirements. Security-related parameters include: registry settings; account, file, and directory settings (i.e., permissions); and settings for services, ports, protocols, and remote connections. Incident Response teams require input from authoritative sources in order to investigate events that have occurred. Configuration management solutions are a logical source for providing information regarding system configuration changes. Unauthorized, security-relevant configuration changes must be incorporated into the organization's incident response capability to ensure such detected events are tracked for historical purposes. Rationale for non-applicability: Configuration management applications are within the scope of the MDM SRG.
STIG Date
Mobile Application Security Requirements Guide 2013-01-04

Details

Check Text ( C-43747r1_chk )
This requirement is NA for the MAPP SRG.
Fix Text (F-39933r1_fix)
The requirement is NA. No fix is required.