Skip to content

Ivanti Connect Secure NDM Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000412-NDM-000331

    Group
  • The ICS must be configured to implement cryptographic mechanisms using a FIPS 140-2/140-3 approved algorithm.

    If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to eavesdropping, potentially putting sensitive data (including a...
    Rule High Severity
  • The ICS must be configured to prevent nonprivileged users from executing privileged functions.

    Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privilege...
    Rule High Severity
  • The ICS must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.

    If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will mak...
    Rule Medium Severity
  • The ICS must be configured to record time stamps for audit records that can be mapped to Greenwich Mean Time (GMT).

    If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Tim...
    Rule Medium Severity
  • The ICS must be configured to allocate local audit record storage capacity in accordance with organization-defined audit record storage requirements.

    In order to ensure network devices have a sufficient storage capacity in which to write the audit logs, they need to be able to allocate audit record storage capacity. The task of allocating audit ...
    Rule Medium Severity
  • The ICS must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.

    Authentication for administrative (privileged level) access to the device is required at all times. An account can be created on the device's local database for use when the authentication server i...
    Rule Medium Severity
  • The ICS must be configured to terminate after 10 minutes of inactivity except to fulfill documented and validated mission requirements.

    Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port th...
    Rule High Severity
  • The ICS must be configured to support organizational requirements to conduct weekly backups of information system documentation, including security-related documentation.

    Information system backup is a critical step in maintaining data assurance and availability. Information system and security-related documentation contains information pertaining to system configur...
    Rule Medium Severity
  • The ICS must be configured to enforce a minimum 15-character password length.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to d...
    Rule Medium Severity
  • The ICS must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.

    If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at ...
    Rule Medium Severity
  • The ICS must be configured to enforce password complexity by requiring that at least one lowercase character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • The ICS must be configured to enforce password complexity by requiring that at least one uppercase character be used.

    Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisti...
    Rule Medium Severity
  • The ICS must be configured to conduct backups of system level information contained in the information system when changes occur.

    System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execu...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000350

    Group
  • The ICS must be configured to send admin log data to a redundant central log server.

    The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate security personnel. The stored log data can used to detect weaknesses in se...
    Rule High Severity
  • SRG-APP-000340-NDM-000288

    Group
  • SRG-APP-000343-NDM-000289

    Group
  • The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.

    Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...
    Rule Medium Severity
  • SRG-APP-000395-NDM-000310

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules