U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Ivanti Connect Secure STIG Y23M11 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Ivanti Connect Secure cpe:/a:ivanti:connect_secure:- (View CVEs)

Checklist Highlights

Checklist Name:
Ivanti Connect Secure STIG
Checklist ID:
1077
Version:
Y23M11
Type:
Compliance
Review Status:
Final
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
11/08/2023

Checklist Summary:

The Ivanti Connect Secure (ICS) Security Technical Implementation Guide (STIG) provides security policy and technical configuration requirements for deploying the device in the Department of Defense (DOD) networking environment. The ICS STIG comprises the following individual STIGs: • Ivanti Connect Secure Network Device Management (NDM) STIG. • Ivanti Connect Secure Virtual Private Network (VPN) STIG. The scope of the ICS STIG is the SSL VPN access services functions. The ICS device sits at the network boundary and provides secure access to internal servers for remote clients using the web browser. While client authentication is in scope, endpoint assessment authorization and intrusion detection are not part of the current STIG.

Checklist Role:

  • Enterprise Firewall

Known Issues:

Not provided.

Target Audience:

Not provided.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DOD Directive 8500.1 and DOD Instruction 8500.2 and the Information Assurance (IA) Controls

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule.

Disclaimer:

Not provided.

Product Support:

Parties within the DOD and federal government’s computing environments can obtain the applicable STIG from the DOD Cyber Exchange website at https://cyber.mil/. This site contains the latest copies of STIGs, SRGs, and other related security information. Those without a Common Access Card (CAC) that has DOD Certificates can obtain the STIG from https://public.cyber.mil/.

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

new checklist - 11/17/2023
Change to FINAL - 12/18/23

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 12/18/2023