Ivanti Connect Secure STIG Y24M10 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Ivanti Connect Secure STIG
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Ivanti Connect Secure | cpe:/a:ivanti:connect_secure:- (View CVEs) |
Checklist Highlights
- Checklist Name:
- Ivanti Connect Secure STIG
- Checklist ID:
- 1077
- Version:
- Y24M10
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 11/08/2023
Checklist Summary:
The Ivanti Connect Secure (ICS) Security Technical Implementation Guide (STIG) provides security policy and technical configuration requirements for deploying the device in the Department of Defense (DOD) networking environment. The ICS STIG comprises the following individual STIGs: • Ivanti Connect Secure Network Device Management (NDM) STIG. • Ivanti Connect Secure Virtual Private Network (VPN) STIG. The scope of the ICS STIG is the SSL VPN access services functions. The ICS device sits at the network boundary and provides secure access to internal servers for remote clients using the web browser. While client authentication is in scope, endpoint assessment authorization and intrusion detection are not part of the current STIG.
Checklist Role:
- Enterprise Firewall
Known Issues:
Not provided.
Target Audience:
Not provided.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
DOD Directive 8500.1 and DOD Instruction 8500.2 and the Information Assurance (IA) Controls
Comments/Warnings/Miscellaneous:
Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule.
Disclaimer:
Not provided.
Product Support:
Parties within the DOD and federal government’s computing environments can obtain the applicable STIG from the DOD Cyber Exchange website at https://cyber.mil/. This site contains the latest copies of STIGs, SRGs, and other related security information. Those without a Common Access Card (CAC) that has DOD Certificates can obtain the STIG from https://public.cyber.mil/.
Point of Contact:
disa.stig_spt@mail.mil
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
new checklist - 11/17/2023 Change to FINAL - 12/18/23 Resource & SHA updated - 08/06/2024 Updated Version - 08/08/2024 Resource and Title Updated - 10/25/2024
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|