Ivanti Connect Secure NDM Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000164-NDM-000252
<GroupDescription></GroupDescription>Group -
The ICS must be configured to terminate after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
<VulnDiscussion>Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...Rule High Severity -
SRG-APP-000149-NDM-000247
<GroupDescription></GroupDescription>Group -
The ICS must be configured to use DOD PKI as multifactor authentication (MFA) for interactive logins.
<VulnDiscussion>MFA is when two or more factors are used to confirm the identity of an individual who is requesting access to digital informa...Rule High Severity -
SRG-APP-000373-NDM-000298
<GroupDescription></GroupDescription>Group -
The ICS must be configured to synchronize internal information system clocks using redundant authoritative time sources.
<VulnDiscussion>The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...Rule Medium Severity -
SRG-APP-000516-NDM-000344
<GroupDescription></GroupDescription>Group -
The ICS must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
<VulnDiscussion>For user certificates, each organization obtains certificates from an approved and shared service provider, as required by OM...Rule Medium Severity -
SRG-APP-000516-NDM-000341
<GroupDescription></GroupDescription>Group -
The ICS must be configured to support organizational requirements to conduct weekly backups of information system documentation, including security-related documentation.
<VulnDiscussion>Information system backup is a critical step in maintaining data assurance and availability. Information system and security-...Rule Medium Severity -
SRG-APP-000516-NDM-000351
<GroupDescription></GroupDescription>Group -
The ICS must be configured to enforce a minimum 15-character password length.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-APP-000172-NDM-000259
<GroupDescription></GroupDescription>Group -
The ICS must be configured to transmit only encrypted representations of passwords.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule High Severity -
SRG-APP-000170-NDM-000329
<GroupDescription></GroupDescription>Group -
The ICS must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
<VulnDiscussion>If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of pass...Rule Medium Severity -
SRG-APP-000168-NDM-000256
<GroupDescription></GroupDescription>Group -
The ICS must be configured to enforce password complexity by requiring that at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-APP-000167-NDM-000255
<GroupDescription></GroupDescription>Group -
The ICS must be configured to enforce password complexity by requiring that at least one lowercase character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.