STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to MobileIron Core v10.x MDM Security Technical Implementation Guide

V-91819

CAT II (Medium)

The MobileIron Core v10 server must be configured to implement FIPS 140-2 mode for all server encryption (if not automatically configured during server install).

Rule ID

SV-101921r1_rule

STIG

MobileIron Core v10.x MDM Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001145

Discussion

Unapproved cryptographic algorithms cannot be relied on to provide confidentiality or integrity, and DoD data could be compromised as a result. The most common vulnerabilities with cryptographic modules are those associated with poor implementation. FIPS 140-2 validation provides assurance that the relevant cryptography has been implemented correctly. FIPS 140-2 validation is also a strict requirement for use of cryptography in the federal government for protecting unclassified data. SFR ID: FCS

Check Content

On the MDM console, do the following:
1. SSH to MobileIron Core Server from any SSH client.
2. Enter the administrator credentials you set when you installed MobileIron Core.
3. Enter "show fips".
4. Verify "FIPS 140 mode is enabled" is displayed.

If the MobileIron Server Core does not report that fips mode is "enabled", this is a finding.

Fix Text

Configure the MDM server to use a FIPS 140-2-validated cryptographic module.

On the MDM console, do the following:
1. SSH to MobileIron Core Server from any SSH client.
2. Enter the administrator credentials you set when you installed MobileIron Core.
3. Enter "enable".
4. When prompted, enter the "enable secret" you set when you installed MobileIron Core.
5. Enter "configure terminal".
6. Enter the following command to enable FIPS: fips
7. Enter the following command to proceed with the necessary reload: do reload