STIGQter STIGQter: STIG Summary: McAfee Application Control 8.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The requirement for scheduled Solidcore client Command Line Interface (CLI) Access Password changes must be documented in the organizations written policy.

DISA Rule

SV-213320r506897_rule

Vulnerability Number

V-213320

Group Title

SRG-APP-000174

Rule Version

MCAC-PO-000104

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Follow the formal change and acceptance process to update the written policy with specific information on the frequency with which the CLI password is changed.

Check Contents

Note: The CLI Access is in lockdown mode by default when being managed by ePO. Since the CLI Access can be recovered for troubleshooting, this requirement needs to be met.

Consult with the ISSO/ISSM to obtain a copy of the organization's documented policy for application whitelisting.

Review the written policy for how the Solidcore client interface is used by the organization.

Verify the policy identifies the frequency with which the CLI password is changed.

If the written policy does not contain specific information on frequency with which the CLI password is changed, this is a finding.

Vulnerability Number

V-213320

Documentable

False

Rule Version

MCAC-PO-000104

Severity Override Guidance

Note: The CLI Access is in lockdown mode by default when being managed by ePO. Since the CLI Access can be recovered for troubleshooting, this requirement needs to be met.

Consult with the ISSO/ISSM to obtain a copy of the organization's documented policy for application whitelisting.

Review the written policy for how the Solidcore client interface is used by the organization.

Verify the policy identifies the frequency with which the CLI password is changed.

If the written policy does not contain specific information on frequency with which the CLI password is changed, this is a finding.

Check Content Reference

M

Target Key

3982

Comments