STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Ivanti MobileIron Sentry 9.x NDM Security Technical Implementation Guide

V-251003

CAT III (Low)

MobileIron Sentry must enforce access restrictions associated with changes to the system components.

Rule ID

SV-251003r802231_rule

STIG

Ivanti MobileIron Sentry 9.x NDM Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000345

Discussion

Changes to the hardware or software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network device for implementing any changes or upgrades. This requirement applies to updates of the application files, configuration, ACLs, and policy filters.

Check Content

Verify that only authorized administrators have permissions for changes, deletions, and updates on the MobileIron Sentry. 

1. Log in to System Manager.
2. Go to Security >> Local Users.
3. Verify no unauthorized users are listed.

If unauthorized users are listed, this is a finding.

Fix Text

Configure that only authorized administrators have permissions for changes, deletions, and updates on the MobileIron Sentry. 

1. Log in to System Manager.
2. Go to Security >> identity Source >> Local Users. 
3. Click "Add" to add authorized users.
4. If unauthorized users are listed, click the check box next to the unauthorized user and click "Delete".