UCF STIG Viewer Logo

Ivanti Connect Secure NDM Security Technical Implementation Guide


Overview

Date Finding Count (28)
2023-10-17 CAT I (High): 8 CAT II (Med): 20 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-258598 High The ICS must be configured to implement cryptographic mechanisms using a FIPS 140-2/3 approved algorithm.
V-258599 High The ICS must be configured to send admin log data to a redundant central log server.
V-258608 High The ICS must be configured to terminate after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
V-258609 High The ICS must be configured to use DOD PKI as multifactor authentication (MFA) for interactive logins.
V-258600 High The ICS must be configured to prevent nonprivileged users from executing privileged functions.
V-258613 High The ICS must be configured to run an operating system release that is currently supported by Ivanti.
V-258615 High The ICS must be configured to transmit only encrypted representations of passwords.
V-258620 High The ICS must be configured to use DOD approved OCSP responders or CRLs to validate certificates used for PKI-based authentication.
V-258605 Medium The ICS must be configured to allocate local audit record storage capacity in accordance with organization-defined audit record storage requirements.
V-258602 Medium If SNMP is used, the ICS must be configured to use SNMPv3 with FIPS-140-2/3 validated Keyed-Hash Message Authentication Code (HMAC).
V-258603 Medium The ICS must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.
V-258606 Medium The ICS must be configured to enforce password complexity by requiring that at least one special character be used.
V-258607 Medium The ICS must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.
V-258604 Medium The ICS must be configured to record time stamps for audit records that can be mapped to Greenwich Mean Time (GMT).
V-258623 Medium The ICS must be configured to display the Standard Mandatory DOD Notice and Consent Banner before granting access to manage the device.
V-258624 Medium The ICS must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.
V-258625 Medium The ICS must be configured to conduct backups of system level information contained in the information system when changes occur.
V-258601 Medium The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.
V-258611 Medium The ICS must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
V-258610 Medium The ICS must be configured to synchronize internal information system clocks using redundant authoritative time sources.
V-258612 Medium The ICS must be configured to support organizational requirements to conduct weekly backups of information system documentation, including security-related documentation.
V-258614 Medium The ICS must be configured to enforce a minimum 15-character password length.
V-258617 Medium The ICS must be configured to enforce password complexity by requiring that at least one numeric character be used.
V-258616 Medium The ICS must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
V-258619 Medium The ICS must be configured to enforce password complexity by requiring that at least one uppercase character be used.
V-258618 Medium The ICS must be configured to enforce password complexity by requiring that at least one lowercase character be used.
V-258621 Medium The ICS must be configured to generate audit records when successful/unsuccessful attempts to access privileges occur.
V-258622 Medium The ICS must be configured to limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type.