UCF STIG Viewer Logo

Applications providing patch management capabilities must support the organizational requirements to install software updates automatically.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35703 SRG-APP-000269-MAPP-NA SV-46990r1_rule Medium
Description
Security faults with software applications and operating systems are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to promptly install security-relevant software updates (e.g., patches, service packs, and hot fixes). Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling, must also be addressed expeditiously. Anytime new software code is introduced to a system there is the potential for unintended consequences. There have been documented instances where the application of a patch has caused problems with system integrity or availability. Due to information system integrity and availability concerns, organizations must give careful consideration to the methodology used to carry out automatic updates. Rationale for non-applicability: The MDM determines the state of information system components with respect to flaw remediation. This is outside the scope of this SRG. Moreover, typically mobile applications are not "patched" but are replaced with an updated version.
STIG Date
Mobile Application Security Requirements Guide 2013-01-04

Details

Check Text ( C-44046r1_chk )
This requirement is NA for the MAPP SRG.
Fix Text (F-40246r1_fix)
The requirement is NA. No fix is required.