STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Samsung SDS EMM Security Technical Implementation Guide

Version

V1R3

Release Date

Jun 10, 2022

SCAP Benchmark ID

Samsung_SDS_EMM_STIG

Total Checks

23

Tags

other
CAT I: 4CAT II: 17CAT III: 2

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (23)

V-225640LOWThe Samsung SDS EMM must implement functionality to generate an audit record of the following auditable events: c. [selection: Commands issued to the MDM Agent].V-225641MEDIUMThe Samsung SDS EMM must be configured to communicate the following commands to the MDM Agent: read audit logs kept by the MD.V-225642MEDIUMThe Samsung SDS EMM or platform must be configured to initiate a session lock after a 15-minute period of inactivity.V-225643MEDIUMThe Samsung SDS EMM must be configured to transfer Samsung SDS EMM logs to another server for storage, analysis, and reporting. Note: Samsung SDS EMM logs include logs of MDM events and logs transferred to the Samsung SDS EMM by MDM agents of managed devices.V-225644MEDIUMThe Samsung SDS EMM must be configured to display the required DoD warning banner upon administrator logon. Note: This requirement is not applicable if the TOE platform is selected in FTA_TAB.1.1 in the Security Target (ST).V-225645MEDIUMThe Samsung SDS EMM must be configured with a periodicity for reachable events of six hours or less for the following commands to the agent: - query connectivity status; - query the current version of the MD firmware/software; - query the current version of installed mobile applications; - read audit logs kept by the MD.V-225646MEDIUMThe Samsung SDS EMM must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, auditor.V-225647MEDIUMThe Samsung SDS EMM must be configured to audit DoD or site-defined auditable events. Note: See VulDiscussion for a list of DoD required auditable events.V-225648LOWThe [selection: Samsung SDS EMM, MDM platform] must have the capability to display the DoD warning banner prior to establishing a user session.V-225649HIGHThe Samsung SDS EMM server must be configured to use one-time password in addition to username and password for administrator logon to the server.V-225650HIGHThe Samsung SDS EMM server must be maintained at a supported version.V-225651MEDIUMThe Samsung SDS EMM platform must be protected by a DoD-approved firewall.V-225652MEDIUMThe firewall protecting the Samsung SDS EMM platform must be configured to restrict all network traffic to and from all addresses with the exception of ports, protocols, and IP address ranges required to support Samsung SDS EMM and platform functions.V-225653MEDIUMThe firewall protecting the Samsung SDS EMM platform must be configured so that only DoD-approved ports, protocols, and services are enabled. See the DoD Ports, Protocols, Services Management [PPSM] Category Assurance Levels [CAL] list for DoD-approved ports, protocols, and services.V-225654MEDIUMThe Samsung SDS EMM must limit the number of concurrent sessions to one session for all accounts and/or account types.V-225655MEDIUMThe Samsung SDS EMM must automatically disable accounts after a 35 day period of account inactivity (local accounts).V-225656MEDIUMThe Samsung SDS EMM must enforce the limit of three consecutive invalid logon attempts by a user.V-225657MEDIUMThe Samsung SDS EMM must use multifactor authentication for local access to privileged accounts.V-245525HIGHThe Samsung SDS EMM must be configured to leverage the MDM platform administrator accounts and groups for Samsung SDS EMM user identification and CAC authentication.V-245526HIGHAuthentication of MDM platform accounts must be configured so they are implemented via an enterprise directory service.V-245527MEDIUMThe Samsung SDS EMM local accounts password must be configured with length of 15 characters.V-245528MEDIUMThe Samsung SDS EMM local accounts must be configured with password maximum lifetime of 60 Days.V-245529MEDIUMThe Samsung SDS EMM local accounts must prohibit password reuse for a minimum of five generations.