Ivanti Connect Secure NDM Security Technical Implementation Guide

  • Version/Release: V1R1
  • Published: 2023-10-17
  • Expand All:
  • Severity:
  • Sort:
Compare

Select any two versions of this STIG to compare the individual requirements

View

Select any old version/release of this STIG to view the previous requirements

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
c
The ICS must be configured to implement cryptographic mechanisms using a FIPS 140-2/3 approved algorithm.
MA-4 - High - CCI-003123 - V-258598 - SV-258598r930482_rule
RMF Control
MA-4
Severity
High
CCI
CCI-003123
Version
IVCS-NM-000010
Vuln IDs
  • V-258598
Rule IDs
  • SV-258598r930482_rule
This configuration protects to protect the confidentiality of Web UI session and guards against DoS attacks. This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to eavesdropping, potentially putting sensitive data (including administrator passwords) at risk of compromise and potentially allowing hijacking of maintenance sessions. When JITC and FIPS mode is enabled, it enables DoS attacks such as flooding and replay attack audit logs inherently. JITC and FIPS mode are required for ICS use in DOD.
Checks: C-62338r930480_chk

Verify all settings to ensure only FIPS 140-2/3 algorithms are enabled. In the ICS Web UI, navigate to System >> Configuration >> Security >> Inbound SSL Options. 1. Verify "Turn on JITC mode" checkbox is enabled (checked). 2. Verify "Turn on NDcPP mode" checkbox is enabled (checked). 3. Verify "Turn on FIPS mode" checkbox is enabled (checked). If the use of FIPS 140-2 approved algorithms is not enabled, this is a finding.

Fix: F-62247r930481_fix

Enable compliance modes to ensure only FIPS 140-2/3 algorithms are used and to guard against DoS attacks. JITC, NDcPP, and FIPS modes are required for ICS use in DOD. In the ICS Web UI, navigate to System >> Configuration >> Security >> Inbound SSL Options. 1. Under "DOD Certification Option", check (enabled) "Turn on JITC mode" to enable the JITC mode security features. 2. Once "Turn on JITC mode" is checked, "Turn on NDcPP mode" and "Turn on FIPS mode" are also checked automatically. 3. Click "Save changes" and confirm after the web UI asks for SSL cipher configuration changes.

c
The ICS must be configured to send admin log data to a redundant central log server.
AU-4 - High - CCI-001851 - V-258599 - SV-258599r930485_rule
RMF Control
AU-4
Severity
High
CCI
CCI-001851
Version
IVCS-NM-000030
Vuln IDs
  • V-258599
Rule IDs
  • SV-258599r930485_rule
The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate security personnel. The stored log data can used to detect weaknesses in security that enable the network IA team to find and address these weaknesses before breaches can occur. Reviewing these logs, whether before or after a security breach, are important in showing whether someone is an internal employee or an outside threat. Satisfies: SRG-APP-000516-NDM-000350, SRG-APP-000360-NDM-000295, SRG-APP-000515-NDM-000325
Checks: C-62339r930483_chk

Verify the ICS is configured with address information so it sends admin log event records to a central log server. In the ICS Web UI, navigate to System >> Log/Monitoring >> Events >> Settings. Under "Syslog Servers", verify a server name/IP address, facility of LOCAL0, type TLS, and the management source interface are defined. In the ICS Web UI, navigate to System >> Log/Monitoring >> Admin Access >> Settings. Under "Syslog Servers", verify server names/IP addresses are added. Also ensure facility of LOCAL0, type TLS, and them management source interface are not defined. If the ICS is not configured to send log admin log events data to redundant central log servers, this is a finding.

Fix: F-62248r930484_fix

Configure the ICS with the address information for the redundant central log servers. In the ICS Web UI: 1. Navigate to System >> Log/Monitoring >> Events >> Settings. 2. Under "Syslog Servers" add an IP address/server name/IP. 3. Set the facility to LOCAL0. 4. Set type to TLS. 5. If a client cert is required for the syslog server, select the client certificate to use for the syslog traffic. If none exists, import the DOD-signed client key pair to the ICS under System >> Configuration >> Certificates >> Client Auth Certificates. 6. Set the standard filer. 7. Set the source interface as the management interface. 8. Click "Add". 9. Click "Save Changes". 10. Repeat these steps for the admin logs under System >> Log/Monitoring >> Admin Access >> Settings. 11. Repeat these steps to add a redundant syslog server.

c
The ICS must be configured to prevent nonprivileged users from executing privileged functions.
AU-9 - High - CCI-000163 - V-258600 - SV-258600r930488_rule
RMF Control
AU-9
Severity
High
CCI
CCI-000163
Version
IVCS-NM-000050
Vuln IDs
  • V-258600
Rule IDs
  • SV-258600r930488_rule
Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Nonprivileged users are individuals that do not possess appropriate authorizations. Satisfies: SRG-APP-000340-NDM-000288, SRG-APP-000380-NDM-000304, SRG-APP-000378-NDM-000302, SRG-APP-000133-NDM-000244, SRG-APP-000123-NDM-000240, SRG-APP-000121-NDM-000238, SRG-APP-000231-NDM-000271, SRG-APP-000408-NDM-000314, SRG-APP-000329-NDM-000287, SRG-APP-000153-NDM-000249, SRG-APP-000119-NDM-000236, SRG-APP-000120-NDM-000237, SRG-APP-000033-NDM-000212, SRG-APP-000516-NDM-000335, SRG-APP-000516-NDM-000336, SRG-APP-000177-NDM-000263, SRG-APP-000080-NDM-000220
Checks: C-62340r930486_chk

Verify Realms and Roles are configured as needed to meet mission requirements. In the ICS Web UI, navigate to Administrators >> Admin Realms >> Admin Realms. 1. Click the admin realm that is currently being used on the ICS for administrator logins. By default, it is "Admin Users". 2. In the "General" tab, under Servers >> Directory/Attribute, verify it does not say "none". 3. In the "Role Mapping" tab, under "when users meet these conditions", verify the following: - "Group" must be used, and the local site's administrator active directory group must be selected and assigned to the ".Administrators" role. Note that this role could be different if using something other than the default ".Administrators" role. - Verify separate usernames are not used. Verify an allow-all username of * is used. If a realm or role is not configured to prevent nonprivileged users from executing privileged functions, this is a finding.

Fix: F-62249r930487_fix

Configure Realms and Roles as needed to meet mission requirements. Note: The ".Administrators" role is a default role name, other administrator role names can be used. Groups must be used, separate usernames or an allow-all username of * is not acceptable. In the ICS Web UI, navigate to Administrators >> Admin Realms >> Admin Realms. 1. Click the admin realm that is currently being used on the ICS for administrator logins. By default, it is "Admin Users". 2. In the "General" tab, under Servers >> Directory/Attribute, select the previously configured LDAP Directory. If none is configured, follow vendor supplied instructions for creating an LDAP Authentication Server. 3. In the "Role Mapping" tab, under "when users meet these conditions", select new rule. 4. Under rule based on, select "Group Membership". 5. Give the rule a name. 6. Select "is". 7. Provide the exact group name in the text box. This name must match the "CN=" attribute name. For example, if the group is "CN=ivanti.adm.group" then add the "ivanti.adm.group" to the text box. 8. Under "then assign these roles", select the admin role used by ICS for admin logins. By default this is ".Administrators". 9. Click "Save Changes". 10. Under "Role Mapping", if there are more roles needed for more specific role-based access to the ICS, configure more of them here. 11. Once complete, click "Save Changes".

b
The ICS must be configured to audit the execution of privileged functions such as accounts additions and changes.
AC-2 - Medium - CCI-000018 - V-258601 - SV-258601r930491_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-000018
Version
IVCS-NM-000060
Vuln IDs
  • V-258601
Rule IDs
  • SV-258601r930491_rule
Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Auditing the use of privileged functions is one way to detect such misuse and identify the risk from insider threats and the advanced persistent threat. Satisfies: SRG-APP-000343-NDM-000289, SRG-APP-000495-NDM-000318, SRG-APP-000499-NDM-000319, SRG-APP-000503-NDM-000320, SRG-APP-000504-NDM-000321, SRG-APP-000505-NDM-000322, SRG-APP-000506-NDM-000323, SRG-APP-000319-NDM-000283, SRG-APP-000381-NDM-000305, SRG-APP-000100-NDM-000230, SRG-APP-000029-NDM-000211, SRG-APP-000028-NDM-000210, SRG-APP-000027-NDM-000209, SRG-APP-000038-NDM-000213, SRG-APP-000099-NDM-000229, SRG-APP-000098-NDM-000228, SRG-APP-000097-NDM-000227, SRG-APP-000096-NDM-000226, SRG-APP-000095-NDM-000225, SRG-APP-000026-NDM-000208, SRG-APP-000412-NDM-000331, SRG-APP-000411-NDM-000330, SRG-APP-000435-NDM-000315, SRG-APP-000156-NDM-000250, SRG-APP-000224-NDM-000270, SRG-APP-000179-NDM-000265, SRG-APP-000142-NDM-000245
Checks: C-62341r930489_chk

In the ICS Web UI, navigate to System >> Log/Monitoring >> Admin Access >> Settings, under the section "Select Events to Log". If Administrator changes is enabled for events logging, this is a finding.

Fix: F-62250r930490_fix

Enable logging for admin event actions. In the ICS Web UI, navigate to System >> Log/Monitoring >> Admin Access >> Settings. 1. Check the box for Administrator changes under the section "Select Events to Log". 2. Click "Save Changes".

b
If SNMP is used, the ICS must be configured to use SNMPv3 with FIPS-140-2/3 validated Keyed-Hash Message Authentication Code (HMAC).
IA-3 - Medium - CCI-001967 - V-258602 - SV-258602r930494_rule
RMF Control
IA-3
Severity
Medium
CCI
CCI-001967
Version
IVCS-NM-000090
Vuln IDs
  • V-258602
Rule IDs
  • SV-258602r930494_rule
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are of greater risk. A local connection is any connection with a device communicating without the use of a network. A network connection is any connection with a device that communicates through a network (e.g., local area or wide area network, internet). A remote connection is any connection with a device communicating through an external network (e.g., the internet). Because of the challenges of applying this requirement on a large scale, organizations are encouraged to only apply the requirement to those limited number (and type) of devices that truly need to support this capability.
Checks: C-62342r930492_chk

If SNMP is not used, this is not applicable. In the ICS Web UI, navigate to System >> Log/Monitoring >> SNMP. Under "SNMP version data", verify v2c is not selected. If the ICS does not use properly configured SNMPv3, this is a finding.

Fix: F-62251r930493_fix

This is applicable if SNMP is enabled. Though the entire SNMP configuration is given to prevent misconfiguration, note that this requirement is focused on the use of v3. In the ICS Web UI, navigate to System >> Log/Monitoring >> SNMP. 1. Under "SNMP version data", select v3. 2. Under "Agent Properties", select SNMP Queries. 3. Define the System Name. 4. Define the System Location. 5. Define the System Contact. 6. Under "SNMPv3 Configuration" and "User 1" type the username. 7. Select the "Security Level" of Auth, Priv. 8. Select SHA as the Auth Protocol. 9. Type the Auth password. 10. Select "CFB-AES-128" as the Priv Protocol. 11. Type the Priv password. 12. Under Optional Traps, select "Critical and Major log events". 13. Click "Save Changes".

b
The ICS must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.
IA-3 - Medium - CCI-001967 - V-258603 - SV-258603r930497_rule
RMF Control
IA-3
Severity
Medium
CCI
CCI-001967
Version
IVCS-NM-000100
Vuln IDs
  • V-258603
Rule IDs
  • SV-258603r930497_rule
If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will make log timestamps inaccurate and affect scheduled actions. NTP authentication is used to prevent this tampering by authenticating the time source.
Checks: C-62343r930495_chk

In the ICS Web UI, navigate to System >> Status >> Dashboard. 1. Click the "Overview" tab. 2. Under "Appliance Details" and "System Date and Time", select "Edit". 3. Verify the "Use Pool of NTP servers" is checked with NTP server IPs defined. 4. Verify the NTP server IP/hostname is defined with a key. If the ICS does not authenticate NTP sources using authentication that is cryptographically based, this is a finding.

Fix: F-62252r930496_fix

In the ICS Web UI, navigate to System >> Status >> Dashboard. 1. Click the "Overview" tab. 2. Under "Appliance Details" and "System Date and Time" select "Edit". 3. Select the Time Zone to use - DOD may require GMT. 4. Select "Use Pool of NTP servers". 5. Enter the IP/hostname of each NTP server in the "NTP Server 1", "NTP Server 2", etc. 6. Under the key section input the key in the following format: <keynumber> <algorithm> <key> For example, it would be entered like this: 1 SHA1 NtPKey123. Note: there must be a space between each section of <keynumber> <algorithm> <key> 7. Click "Save Changes". 8. Navigate to System >> Log/Monitoring >> Events. 9. Ensure an event log stating the time sync is successful.

b
The ICS must be configured to record time stamps for audit records that can be mapped to Greenwich Mean Time (GMT).
AU-8 - Medium - CCI-001890 - V-258604 - SV-258604r930500_rule
RMF Control
AU-8
Severity
Medium
CCI
CCI-001890
Version
IVCS-NM-000120
Vuln IDs
  • V-258604
Rule IDs
  • SV-258604r930500_rule
If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by the application include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC.
Checks: C-62344r930498_chk

In the ICS Web UI, navigate to System &gt;&gt; Status &gt;&gt; Dashboard. 1. Click the "Overview" tab. 2. Under "Appliance Details" and "System Date and Time", select "Edit". 3. Verify the "Time Zone" is set to "(GMT) Coordinated Universal Time". If the ICS must be configured to record time stamps for audit records that can be mapped to GMT, this is a finding.

Fix: F-62253r930499_fix

In the ICS Web UI, navigate to System >> Status >> Dashboard. 1. Click the "Overview" tab. 2. Under "Appliance Details" and "System Date and Time", select "Edit". 3. Select "(GMT) Coordinated Universal Time". 4. Click "Save Changes".

b
The ICS must be configured to allocate local audit record storage capacity in accordance with organization-defined audit record storage requirements.
AU-4 - Medium - CCI-001849 - V-258605 - SV-258605r930503_rule
RMF Control
AU-4
Severity
Medium
CCI
CCI-001849
Version
IVCS-NM-000150
Vuln IDs
  • V-258605
Rule IDs
  • SV-258605r930503_rule
In order to ensure network devices have a sufficient storage capacity in which to write the audit logs, they need to be able to allocate audit record storage capacity. The task of allocating audit record storage capacity is usually performed during initial device setup if it is modifiable. The value for the organization-defined audit record storage requirement will depend on the amount of storage available on the network device, the anticipated volume of logs, the frequency of transfer from the network device to centralized log servers, and other factors.
Checks: C-62345r930501_chk

In the ICS Web UI, navigate to System &gt;&gt; Log Monitoring &gt;&gt; User Access &gt;&gt; Settings. Under the "Minimum Log Size", verify the Max Log Size is equal to or greater than the site's required limit as documented in the SSP (the default is 200 MB). If the ICS is not configured with a Max Log Size that is equal to or greater than the site's required limit, this is a finding.

Fix: F-62254r930502_fix

In the ICS Web UI, navigate to System >> Log Monitoring >> User Access >> Settings. Go to "Minimum Log Size", set the Max Log Size to the value required by the site. By default, it is set to 200MB.

b
The ICS must be configured to enforce password complexity by requiring that at least one special character be used.
IA-5 - Medium - CCI-001619 - V-258606 - SV-258606r930506_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-001619
Version
IVCS-NM-000190
Vuln IDs
  • V-258606
Rule IDs
  • SV-258606r930506_rule
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised. Multifactor authentication (MFA) is required for all administrative and user accounts on network devices, except for an account of last resort and (where applicable) a root account. Passwords should only be used when MFA using PKI is not available, and for the account of last resort and root account.
Checks: C-62346r930504_chk

In the ICS Web UI, navigate to Authentication &gt;&gt; Auth Servers &gt;&gt; Administrators. 1. Verify the setting for "Password must have at least __ letters" is checked. 2. Verify the value for the setting for "Password must have at least __ special characters" is set to "1". If the ICS does not require that at least one special character be used for passwords, this is a finding.

Fix: F-62255r930505_fix

In the ICS Web UI, navigate to Authentication >> Auth Servers >> Administrators. 1. Enable the setting for "Password must have at least __ special characters". 2. In the box, enter "1". 3. Click "Save Changes".

b
The ICS must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.
AC-2 - Medium - CCI-001358 - V-258607 - SV-258607r930509_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-001358
Version
IVCS-NM-000271
Vuln IDs
  • V-258607
Rule IDs
  • SV-258607r930509_rule
Authentication for administrative (privileged level) access to the device is required at all times. An account can be created on the device's local database for use when the authentication server is down or connectivity between the device and the authentication server is not operable. This account is referred to as the account of last resort since it is intended to be used as a last resort and when immediate administrative access is absolutely necessary. The account of last resort logon credentials must be stored in a sealed envelope and kept in a safe. The safe must be periodically audited to verify the envelope remains sealed. The signature of the auditor and the date of the audit should be added to the envelope as a record. Administrators should secure the credentials and disable the root account (if possible) when not needed for system administration functions.
Checks: C-62347r930507_chk

In the ICS Web UI, navigate to Authentication &gt;&gt; Auth Servers &gt;&gt; Administrators. Click the tab "Users" and verify that more than one user does not exist. If the ICS is not configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable, this is a finding.

Fix: F-62256r930508_fix

In the ICS Web UI, navigate to Authentication >> Auth Servers >> Administrators. 1. Click the tab "Users". 2. Create the emergency local user, or click the default admin user. 3. Click the box for "Enabled". 4. Click the box for "Allow Console Access". 5. Click "Save Changes".

c
The ICS must be configured to terminate after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
SC-10 - High - CCI-001133 - V-258608 - SV-258608r930512_rule
RMF Control
SC-10
Severity
High
CCI
CCI-001133
Version
IVCS-NM-000300
Vuln IDs
  • V-258608
Rule IDs
  • SV-258608r930512_rule
Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port that has been left unattended. In addition, quickly terminating an idle session will also free up resources committed by the managed network element. Terminating network connections associated with communications sessions includes, for example, de-allocating associated TCP/IP address/port pairs at the operating system level, or de-allocating networking assignments at the application level if multiple application sessions are using a single, operating system-level network connection. This does not mean that the device terminates all sessions or network access; it only ends the inactive session and releases the resources associated with that session. Upon the termination of a session, the Ivanti ICS inherently ends the inactive session and releases the resources associated with that session.
Checks: C-62348r930510_chk

In the ICS Web UI, navigate to Administrators &gt;&gt; Admins Role &gt;&gt; Delegated Admin Roles. 1. Click the configured admin role being used for CAC/PKI token admin logins (by default it is .Administrators). 2. Click the Session Options tab. 3. In the "Session Lifetime" section, verify the Idle Timeout is set to "10". If the ICS does not terminate after 10 minutes of inactivity except to fulfill documented and validated mission requirements, this is a finding.

Fix: F-62257r930511_fix

In the ICS Web UI, navigate to Administrators >> Admins Role >> Delegated Admin Roles. 1. Click the configured admin role being used for CAC/PKI token admin logins, by default it is .Administrators. 2. Click the Session Options tab. 3. In the "Session Lifetime" section, set the Idle Timeout to "10". 4. Click "Save Changes".

c
The ICS must be configured to use DOD PKI as multifactor authentication (MFA) for interactive logins.
IA-2 - High - CCI-000765 - V-258609 - SV-258609r930515_rule
RMF Control
IA-2
Severity
High
CCI
CCI-000765
Version
IVCS-NM-000320
Vuln IDs
  • V-258609
Rule IDs
  • SV-258609r930515_rule
MFA is when two or more factors are used to confirm the identity of an individual who is requesting access to digital information resources. Valid factors include something the individual knows (e.g., username and password), something the individual has (e.g., a smartcard or token), or something the individual is (e.g., a fingerprint or biometric). Legacy information system environments only use a single factor for authentication, typically a username and password combination. Although two pieces of data are used in a username and password combination, this is still considered single factor because an attacker can obtain access simply by learning what the user knows. Common attacks against single-factor authentication are attacks on user passwords. These attacks include brute force password guessing, password spraying, and password credential stuffing. MFA, along with strong user account hygiene, helps mitigate against the threat of having account passwords discovered by an attacker. Even in the event of a password compromise, with MFA implemented and required for interactive login, the attacker still needs to acquire something the user has or replicate a piece of user's biometric digital presence. Private industry recognizes and uses a wide variety of MFA solutions. However, DOD public key infrastructure (PKI) is the only prescribed method approved for DOD organizations to implement MFA. For authentication purposes, centralized DOD certificate authorities (CA) issue PKI certificate key pairs (public and private) to individuals using the prescribed x.509 format. The private certificates that have been generated by the issuing CA are downloaded and saved to smartcards which, within DOD, are referred to as common access cards (CAC) or personal identity verification (PIV) cards. This happens at designated DOD badge facilities. The CA maintains a record of the corresponding public keys for use with PKI-enabled environments. Privileged user smartcards, or "alternate tokens", function in the same manner, so this requirement applies to all interactive user sessions (authorized and privileged users). Note: This requirement is used in conjunction with the use of a centralized authentication server (e.g., AAA, RADIUS, LDAP), a separate but equally important requirement. The MFA configuration of this requirement provides identification and the first phase of authentication (the challenge and validated response, thereby confirming the PKI certificate that was presented by the user). The centralized authentication server will provide the second phase of authentication (the digital presence of the PKI ID as a valid user in the requested security domain) and authorization. The centralized authentication server will map validated PKI identities to valid user accounts and determine access levels for authenticated users based on security group membership and role. In cases where the centralized authentication server is not utilized by the network device for user authorization, the network device must map the authenticated identity to the user account for PKI-based authentication.
Checks: C-62349r930513_chk

In the ICS Web UI, navigate to Administrators &gt;&gt; Admin Realms &gt;&gt; Admin Realms. 1. Click the admin realm that is currently being used on the ICS for administrator logins; by default it is "Admin Users". 2. In the general tab, under Servers &gt;&gt; Authentication, verify that a certificate authenticate server is configured. 3. In the general tab, under Servers &gt;&gt; Directory/Attribute, verify it does not show "none". 4. In the role mapping tab, under "when users meet these conditions", verify the following is configured: - "Group" must be used, and the local site's administrator active directory group must be selected and assigned to the ".Administrators" role. Note: this role could be different if using something other than the default ".Administrators" role. - Use of groups instead of individual user accounts. - Ensure the allow-all username of * is not used. If the ICS must be configured to use DOD PKI as MFA for interactive logins, this is a finding.

Fix: F-62258r930514_fix

In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Trusted Server CAs. 1. Click Import Trusted Server CAs. 2. Import the Active Directory root CA certificate by clicking Browse, selecting the certificate file, and clicking Import Certificate. 3. Repeat these steps for the intermediate CA certificate. In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Trusted Client CAs. 1. Click Import CA Certificate. 2. Import the DOD Client CAC root CA certificate by clicking Browse, selecting the certificate file, and clicking Import Certificate (e.g., DOD Root CA 3). 3. Repeat these steps for the intermediate/issuing CAC CA certificate (e.g., DOD ID CA 59). 4. Repeat these steps for each intermediate CAC CA certificate. 5. Click the Root CA certificate that was imported. 6. Under client certificate status checking, ensure the following is set: - Use OCSP with CRL Fallback. - Trusted for client Authentication must be checked. 7. If the network the site is in must use a local OCSP repeater/responder, go to OCSP settings. Otherwise, move on to the Device Certificates. 8. Click OSCP options, Use Manually Configured responders. 9. Enter the URL for the primary and backup OCSP responder. 10. If the OCSP responder requires request signing and Nonce usage, select those here. In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Device Certificates. 1. Click "New CSR". 2. Under Common Name, ensure this has the FQDN for the ICS server. Fill out all other items. 3. If using RSA, select 2048. If using ECC, select P-384. 4. Click Create CSR. Export the CSR and import it into the DOD site's Registration Authority (RA). Ensure that Subject Alternative Names (SANs) are created for all FQDNs, server names, and cluster names on the web enrollment form. 5. Once the certificate is approved, download it and import it in this same section of the ICS. In the ICS Web UI, navigate to Administrators >> Auth Servers. 1. Click "New Servers", under server type, select "Certificate Server", then click "New Server". 2. Type a Name, then under User Name template type <certAttr.altname.UPN>. 3. Click "Save Changes". 4. Navigate to Administrators >> Auth Servers. 5. Click "New Servers". Under server type, select "LDAP Server". Click "New Server". 6. Type a name for the primary LDAP server domain. 7. LDAP server: the FQDN of the server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 8. LDAP port: 636 (this is for LDAPS). 9. Backup LDAP Server1: the FQDN of the secondary server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 10. Backup LDAP Port1: 636. 11. If a third LDAP server is needed, add this and the port info under Backup LDAP Server2 and Backup LDAP Port2. 12. LDAP Server Type: Active Directory. 13. Connection: LDAPS. 14. Ensure Validate Server Certificate is checked. 15. Connection Timeout: 15. 16. Search Timeout: 60. 17. Scroll down to the bottom and click "Save Changes", then click "Test Settings" to ensure valid communications are possible. NOTE: If there are failures in this testing, ensure that the step for Device Certificates and Trusted Server CAs were completed as this will cause LDAPS certificate issues. 18. Under authentication required, click the box for Authentication required to search LDAP. 19. Enter the service account's Admin DN using this as an example format: CN=PCS.SVC,OU=IVANTI,DC=dod,DC=mil 20. Enter the service account's password. 21. Under "Finding user entries" add the base DN of the domain as an example format: DC=dod,DC=mil 22. Under filter, use this specific attribute configuration: userPrincipalName=<USER> 23. Under group membership, add the base DN of where admin users that will access, using this as an example format: OU=IVANTI,DC=dod,DC=mil 24. Under filter use the following: cn=<GROUPNAME> 25. Under member attribute use the following: member. 26. Click "Save Changes". 27. In the same LDAP server configuration screen, scroll down and click the "Server Catalog" hyperlink. 28. Under attributes, click New, Type: userPrincipalName, and save the changes. 29. Under groups, click Search. In the search box, type the group name used for admin logins. 30. Check the box next to the group that is found and click "Add Selected". 31. Repeat these steps for all various groups needed for various roles on the ICS system. For example, groups for auditors, ISSOs, NOC, SOC, Viewer, etc. 32. Click "Save Changes". In the ICS Web UI, navigate to Administrators >> Admin Realms. 1. Click the admin realm being used. By default, "Admin Users" is defined. 2. Under servers, go to Authentication and select the certificate authentication realm created that included the customized User template of <certAttr.altname.UPN> 3. Under Directory/Attribute, select the previously created LDAP server. 4. Check the box for "Enable dynamic policy evaluation". 5. Check both "Refresh roles" and "refresh resource policies". 6. Click "Save Changes". 7. Go to the Role Mapping tab. 8. Click "New Rule". 9. Select "Rule based on Group Membership", click "Update". 10. Type a name for this rule. 11. Select "is". 12. Type the group name exactly as it appears as the CN LDAP attribute. 13. Select the role. The default is ".Administrators" for ICS admins. NOTE: if other roles for access to ICS management are needed, this can be configured in the Administrators >> Admin Roles section. 14. Click "Save Changes". In the ICS Web UI, navigate to Authentication >> Sign-in >> Sign-in Policies. 1. Create a New URL or edit the */admin/ URL - depending on the site. NOTE: it is recommended to create a new sign-in URL until this configuration is fully tested to ensure there is still web UI reachability in the troubleshooting process. 2. Under authentication realm, click the "User picks from a list of authentication realms". 3. Click "Save Changes". Test and verify the connection with CAC/Alt Token and LDAPS by attempting a web UI login using the token or CAC and entering the sign-in URL.

b
The ICS must be configured to synchronize internal information system clocks using redundant authoritative time sources.
CM-6 - Medium - CCI-000366 - V-258610 - SV-258610r930518_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
IVCS-NM-000360
Vuln IDs
  • V-258610
Rule IDs
  • SV-258610r930518_rule
The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other functions. Multiple time sources provide redundancy by including a secondary source. Time synchronization is usually a hierarchy; clients synchronize time to a local source while that source synchronizes its time to a more accurate source. The network device must utilize an authoritative time server and/or be configured to use redundant authoritative time sources. This requirement is related to the comparison done in CCI-001891. DOD-approved solutions consist of a combination of a primary and secondary time source using a combination or multiple instances of the following: a time server designated for the appropriate DOD network (NIPRNet/SIPRNet); United States Naval Observatory (USNO) time servers; and/or the Global Positioning System (GPS). The secondary time source must be located in a different geographic region than the primary time source.
Checks: C-62350r930516_chk

In the ICS Web UI, navigate to System &gt;&gt; Status &gt;&gt; Overview. Under "Appliance Details", and "System Date and Time", click "Edit". If the Time Source is not set to at least two NTP time sources, this is a finding. If the Time Sources are not specific to a DOD authoritative time source, this is a finding. If the Time Sources are not configured to use a SHA1 preshared key for authentication, this is a finding.

Fix: F-62259r930517_fix

In the ICS Web UI, navigate to System >> Status >> Overview. 1. Under "Appliance Details", and "System Date and Time", click "Edit". 2. Click "Use Pool of NTP Servers". 3. Set the IP address or hostname of the first time source. 4. In the "Key 1" box, type the number, algorithm, and key value using this format: 1 SHA1 testingkey 5. Set the IP address or hostname of the second time source, noting that this must be a time source different from the first. 6. In the "Key 2" box, type the number, algorithm, and key value using this format: 1 SHA1 testingkey. 7. Click "Save Changes". 8. Navigate to System >> Log/Monitoring >> Events >> Log on the Web UI. 9. Look in the logs for successful or unsuccessful time sync messages.

b
The ICS must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
CM-6 - Medium - CCI-000366 - V-258611 - SV-258611r930521_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
IVCS-NM-000370
Vuln IDs
  • V-258611
Rule IDs
  • SV-258611r930521_rule
For user certificates, each organization obtains certificates from an approved and shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at medium assurance or higher, this Certification Authority will suffice.
Checks: C-62351r930519_chk

In the ICS Web UI, navigate to System &gt;&gt; Configuration &gt;&gt; Certificates &gt;&gt; Device Certificates. 1. Verify there is a device certificate that is signed by a valid DOD CA. 2. Verify the certificate is used by all interfaces on the ICS. If the ICS does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.

Fix: F-62260r930520_fix

In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Device Certificates. 1. Click "New CSR". 2. Add a Common Name in FQDN format. 3. Add a Country code of US. 4. Under key type, if using RSA, select "RSA". If using ECC, select "ECC". 5. Under the key length, if using RSA, select at least "2048". If using ECC, select "P-384". 6. Type in "Random Data" in the text field. 7. Click "Create CSR". 8. Copy the Base 64/PEM encoded certificate request that is shown on the screen and paste it to a text file. Ensure the file has the file suffix of .csr. 9. Go through the local RA process for DOD Web Server certificate requests. Ensure that SANs are added to the certificate by the issuing CA to include the hostname, cluster names, and all FQDNs. 10. Once the certificate is provided by the CA, go to System >> Configuration >> Certificates >> Device Certificates. 11. Click "Browse" and select the certificate file issued by the CA, then click "Import". 12. Click "Save Changes". 13. Click on the imported certificate. 14. On the "Internal Port", click "add" for the cluster internal VIP and <Internal Port>. 15. On the "External Port", click "add" for the cluster external VIP and <External Port>. 16. Check the box for "Management Port". 17. Under "Certificate Status Checking", click the box for "Use CRLs". 18. Click "Save Changes".

b
The ICS must be configured to support organizational requirements to conduct weekly backups of information system documentation, including security-related documentation.
CM-6 - Medium - CCI-000366 - V-258612 - SV-258612r930524_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
IVCS-NM-000380
Vuln IDs
  • V-258612
Rule IDs
  • SV-258612r930524_rule
Information system backup is a critical step in maintaining data assurance and availability. Information system and security-related documentation contains information pertaining to system configuration and security settings. If this information were not backed up, and a system failure were to occur, the security settings would be difficult to reconfigure quickly and accurately. Maintaining a backup of information system and security-related documentation provides for a quicker recovery time when system outages occur. This control requires the network device to support the organizational central backup process for user account information associated with the network device. This function may be provided by the network device itself; however, the preferred best practice is a centralized backup rather than each network device performing discrete backups.
Checks: C-62352r930522_chk

In the ICS Web UI, navigate to Maintenance &gt;&gt; Archiving &gt;&gt; Archive Servers. 1. Under "Archive Settings" verify an archive server is configured. 2. Under "Archive Schedule" verify "Archive System Configuration", and "Archive User Accounts" are selected. 3. Under "Archive Schedule" verify "Archive System Configuration", and "Archive User Accounts" are configured at a specific time and day of the week. 4. Under "Archive Schedule", if "Archive System Configuration", and "Archive User Accounts" are configured with a password for backup encryption. If the ICS does not support organizational requirements to conduct backups of information system documentation, including security-related documentation weekly, this is a finding.

Fix: F-62261r930523_fix

In the ICS Web UI, navigate to Maintenance >> Archiving >> Archive Servers. 1. Click "SCP" if using an SFTP/SCP server; other mechanisms may not be allowed due to local security policy. NOTE: Check with the ISSM before configuring anything other than SCP. 2. Under "Archive Server" type the hostname or IPv4/IPv6 address. 3. In "Destination Directory" type the path of the backup (e.g., "/backupfolder/ics/"). 4. In the "Username" field, type the username with SCP/SFTP permissions on the backup server. 5. In the "Password" field, type the password. 6. Under "Archive Schedule", select "Archive System Configuration", then click the day of the week and time when the backup should be sent. 7. Under "Archive System Configuration", ensure a password is given to encrypt the backup. 8. Under "Archive Schedule", select "Archive User Accounts", then click the day of the week and time when the backup should be sent. 9. Under "Archive User Accounts", ensure a password is given to encrypt the backup. 10. Click "Save Changes".

c
The ICS must be configured to run an operating system release that is currently supported by Ivanti.
CM-6 - High - CCI-000366 - V-258613 - SV-258613r930527_rule
RMF Control
CM-6
Severity
High
CCI
CCI-000366
Version
IVCS-NM-000410
Vuln IDs
  • V-258613
Rule IDs
  • SV-258613r930527_rule
Network devices running an unsupported operating system lack current security fixes required to mitigate the risks associated with recent vulnerabilities.
Checks: C-62353r930525_chk

Navigate to the ICS support site https://my.pulsesecure.net/. 1. Login using the valid support login. 2. Click the link for "Software Licensing and Download". 3. Click "License and System Download". 4. Click "Software Download". 5. Under "Product Lines", click "Pulse Connect Secure" and again, "Pulse Connect Secure". 6. Click the "End of Support" tab. 7. Now using the ICS Web UI, navigate to Maintenance &gt;&gt; System &gt;&gt; Platform. If the version running under Current Version is on the list of End of Support images on the Ivanti support site, this is a finding.

Fix: F-62262r930526_fix

Navigate to the ICS support site https://my.pulsesecure.net/. 1. Login using the valid support login. 2. Click the link for "Software Licensing and Download". 3. Click either virtual or physical appliance. 4. Click "Software Download". 5. Under Product Lines, click "Pulse Connect Secure" and again, "Pulse Connect Secure". 6. Click "Current and Supported Releases". 7. Click "Download" on the latest ICS images. Using the ICS Web UI navigate to Maintenance >> System >> Upgrade/Downgrade. 1. Ensure the ICS is upgraded in accordance with the site's change management and change control policies, as this will cause a platform outage. 2. Under "Install Service Package" click "Browse" and select the recently downloaded images. 3. Click "Install". 4. Follow all prompts for the upgrading the new images.

b
The ICS must be configured to enforce a minimum 15-character password length.
IA-5 - Medium - CCI-000205 - V-258614 - SV-258614r930530_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000205
Version
IVCS-NM-000440
Vuln IDs
  • V-258614
Rule IDs
  • SV-258614r930530_rule
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to determine strength and how long it takes to crack a password. The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Use of more characters in a password helps to exponentially increase the time and/or resources required to compromise the password.
Checks: C-62354r930528_chk

In the ICS Web UI, navigate to Authentication &gt;&gt; Auth Servers &gt;&gt; Administrators. If the minimum length is not 15 characters, this is a finding.

Fix: F-62263r930529_fix

In the ICS Web UI, navigate to Authentication >> Auth Servers >> Administrators. 1. For minimum length, type "15". 2. Click "Save Changes".

c
The ICS must be configured to transmit only encrypted representations of passwords.
IA-5 - High - CCI-000197 - V-258615 - SV-258615r930533_rule
RMF Control
IA-5
Severity
High
CCI
CCI-000197
Version
IVCS-NM-000450
Vuln IDs
  • V-258615
Rule IDs
  • SV-258615r930533_rule
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. This is applicable to the account of last resort which uses a password. Secure password while in transit for admin access.
Checks: C-62355r930531_chk

In the ICS Web UI, navigate to System &gt;&gt; Configuration &gt;&gt; Inbound SSL Options. Under "Allowed SSL and TLS Version", if "Accept only TLS 1.2 (maximize security)" is checked. Navigate to System &gt;&gt; Configuration &gt;&gt; Outbound SSL Options. Under "Allowed SSL and TLS Version", if "Accept only TLS 1.2 (maximize security)" is checked. If the ICS does not transmit only encrypted representations of passwords, this is a finding.

Fix: F-62264r930532_fix

In the ICS Web UI, navigate to System >> Configuration >> Inbound SSL Options. 1. Under "Allowed SSL and TLS Version", check the box for "Accept only TLS 1.2 (maximize security)". 2. Click "Save Changes". 3. Click "Proceed" for acceptance of Cipher Change. Navigate to System >> Configuration >> Outbound SSL Options. 1. Under "Allowed SSL and TLS Version", check the box for "Accept only TLS 1.2 (maximize security)". 2. Click "Save Changes". 3. Click "Proceed" for acceptance of Cipher Change.

b
The ICS must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
IA-5 - Medium - CCI-000195 - V-258616 - SV-258616r930536_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000195
Version
IVCS-NM-000460
Vuln IDs
  • V-258616
Rule IDs
  • SV-258616r930536_rule
If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at guessing and brute-force attacks. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. In other words, characters may be the same within the two passwords; however, the positions of the like characters must be different. Multifactor authentication (MFA) is required for all administrative and user accounts on network devices, except for an account of last resort and (where applicable) a root account. Passwords should only be used when MFA using PKI is not available, and for the account of last resort and root account.
Checks: C-62356r930534_chk

In the ICS Web UI, navigate to Authentication &gt;&gt; Auth Servers &gt;&gt; Administrators. 1. Verify the setting for "new password must differ from the previous password position" is checked. 2. Verify the value for the setting for "new password must differ from the previous password position" is set to "80". If the ICS is not configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password, this is a finding.

Fix: F-62265r930535_fix

In the ICS Web UI, navigate to Authentication >> Auth Servers >> Administrators. 1. Check the box for "new password must differ from the previous password position". 2. In the box, enter "8". 3. Click "Save Changes".

b
The ICS must be configured to enforce password complexity by requiring that at least one numeric character be used.
IA-5 - Medium - CCI-000194 - V-258617 - SV-258617r930539_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000194
Version
IVCS-NM-000470
Vuln IDs
  • V-258617
Rule IDs
  • SV-258617r930539_rule
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised. Multifactor authentication (MFA) is required for all administrative and user accounts on network devices, except for an account of last resort and (where applicable) a root account. Passwords should only be used when MFA using PKI is not available, and for the account of last resort and root account.
Checks: C-62357r930537_chk

In the ICS Web UI, navigate to Authentication &gt;&gt; Auth Servers &gt;&gt; Administrators. 1. Verify the setting for "Password must have at least __ digits" is checked. 2. Verify the value for the setting for "Password must have at least __ digits" is not set to "1". If the ICS is not configured to enforce password complexity by requiring that at least one numeric character be used, this is a finding.

Fix: F-62266r930538_fix

In the ICS Web UI, navigate to Authentication >> Auth Servers >> Administrators. 1. Check the box for "Password must have at least __ digits". 2. In the box, enter "1". 3. Click "Save Changes".

b
The ICS must be configured to enforce password complexity by requiring that at least one lowercase character be used.
IA-5 - Medium - CCI-000193 - V-258618 - SV-258618r930542_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000193
Version
IVCS-NM-000480
Vuln IDs
  • V-258618
Rule IDs
  • SV-258618r930542_rule
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that need to be tested before the password is compromised. Multifactor authentication (MFA) is required for all administrative and user accounts on network devices, except for an account of last resort and (where applicable) a root account. Passwords should only be used when MFA using PKI is not available, and for the account of last resort and root account.
Checks: C-62358r930540_chk

In the ICS Web UI, navigate to Authentication &gt;&gt; Auth Servers &gt;&gt; Administrators. 1. Verify the setting for "Password must have at least __ letters" is checked. 2. Verify the setting for "Password must have mix of UPPERCASE and lowercase letters" is checked. 3. Verify the value for the setting for "Password must have at least __ letters" is set to "2". If the ICS is not configured to enforce password complexity by requiring that at least one lowercase character be used, this is a finding.

Fix: F-62267r930541_fix

In the ICS Web UI, navigate to Authentication >> Auth Servers >> Administrators. 1. If the setting for "Password must have at least __ letters". 2. In the box, enter "2". 3. Check the box for "Password must have mix of UPPERCASE and lowercase letters". 4. Click "Save Changes".

b
The ICS must be configured to enforce password complexity by requiring that at least one uppercase character be used.
IA-5 - Medium - CCI-000192 - V-258619 - SV-258619r930545_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000192
Version
IVCS-NM-000490
Vuln IDs
  • V-258619
Rule IDs
  • SV-258619r930545_rule
Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determine how long it takes to crack a password. The more complex the password is, the greater the number of possible combinations that need to be tested before the password is compromised. Multifactor authentication (MFA) is required for all administrative and user accounts on network devices, except for an account of last resort and (where applicable) a root account. Passwords should only be used when MFA using PKI is not available, and for the account of last resort and root account.
Checks: C-62359r930543_chk

In the ICS Web UI, navigate to Authentication &gt;&gt; Auth Servers &gt;&gt; Administrators. 1. Verify the setting for "Password must have at least __ letters" is checked. 2. Verify the setting for "Password must have mix of UPPERCASE and lowercase letters" is checked. 3. Verify value for the setting for "Password must have at least __ letters" is set to "2". If the ICS is not configured to enforce password complexity by requiring that at least one upper-case character be used, this is a finding.

Fix: F-62268r930544_fix

In the ICS Web UI, navigate to Authentication >> Auth Servers >> Administrators. 1. If the setting for "Password must have at least __ letters". 2. In the box, enter "2". 3. Check the box for "Password must have mix of UPPERCASE and lowercase letters". 4. Click "Save Changes".

c
The ICS must be configured to use DOD approved OCSP responders or CRLs to validate certificates used for PKI-based authentication.
IA-5 - High - CCI-000185 - V-258620 - SV-258620r930548_rule
RMF Control
IA-5
Severity
High
CCI
CCI-000185
Version
IVCS-NM-000500
Vuln IDs
  • V-258620
Rule IDs
  • SV-258620r930548_rule
Once issued by a DOD certificate authority (CA), public key infrastructure (PKI) certificates are typically valid for three years or shorter within the DOD. However, there are many reasons a certificate may become invalid before the prescribed expiration date. For example, an employee may leave or be terminated and still possess the smartcard on which the PKI certificates were stored. Another example is that a smartcard containing PKI certificates may become lost or stolen. A more serious issue could be that the CA or server which issued the PKI certificates has become compromised, thereby jeopardizing every certificate keypair that was issued by the CA. These examples of revocation use cases and many more can be researched further using internet cybersecurity resources. PKI user certificates presented as part of the identification and authentication criteria (e.g., DOD PKI as multifactor authentication [MFA]) must be checked for validity by network devices. For example, valid PKI certificates are digitally signed by a trusted DOD certificate authority (CA). Additionally, valid PKI certificates are not expired, and valid certificates have not been revoked by a DOD CA. Network devices can verify the validity of PKI certificates by checking with an authoritative CA. One method of checking the status of PKI certificates is to query databases referred to as certificate revocation lists (CRL). These are lists which are published, updated, and maintained by authoritative DOD CAs. For example, once certificates are expired or revoked, issuing CAs place the certificates on a certificate revocation list (CRL). Organizations can download these lists periodically (i.e. daily or weekly) and store them locally on the devices themselves or even onto another nearby local enclave resource. Storing them locally ensures revocation status can be checked even if internet connectivity is severed at the enclave's point of presence (PoP). However, CRLs can be rather large in storage size and further, the use of CRLs can be rather taxing on some computing resources. Another method of validating certificate status is to use the online certificate status protocol (OCSP). Using OCSP, a requestor (i.e. the network device which the user is trying to authenticate to) sends a request to an authoritative CA challenging the validity of a certificate that has been presented for identification and authentication. The CA receives the request and sends a digitally signed response indicating the status of the user's certificate as valid, revoked, or unknown. Network devices should only allow access for responses that indicate the certificates presented by the user were considered valid by an approved DOD CA. OCSP is the preferred method because it is fast, provides the most current status, and is lightweight.
Checks: C-62360r930546_chk

In the ICS Web UI, navigate to System &gt;&gt; Configuration &gt;&gt; Certificates &gt;&gt; Trusted Client CAs. 1. Click the first DOD client CA. 2. Verify the item "Use OCSP with CRL fallback" is selected under the "Client certificate status checking" setting. 3. Check each other client certificate CA. Verify the setting "Use OCSP with CRL fallback" is selected. If the ICS is not configured to use DOD approved OCSP responders or CRLs to validate certificates used for PKI-based authentication, this is a finding.

Fix: F-62269r930547_fix

In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Trusted Client CAs. 1. Click the first DOD client CA. 2. Set the item to "Use OCSP with CRL fallback" under "Client certificate status checking". 3. Repeat these steps for every other client certificate CA.

b
The ICS must be configured to generate audit records when successful/unsuccessful attempts to access privileges occur.
AU-12 - Medium - CCI-000172 - V-258621 - SV-258621r930551_rule
RMF Control
AU-12
Severity
Medium
CCI
CCI-000172
Version
IVCS-NM-000510
Vuln IDs
  • V-258621
Rule IDs
  • SV-258621r930551_rule
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the information system (e.g., module or policy filter).
Checks: C-62361r930549_chk

In the ICS Web UI, navigate to System &gt;&gt; Log/Monitoring &gt;&gt; Admin Access &gt;&gt; Settings. 1. Under the section "Select Events to Log", verify "Administrator Logins" is checked. If the ICS is not configured to generate audit records when successful/unsuccessful attempts to access privileges occur, this is a finding.

Fix: F-62270r930550_fix

In the ICS Web UI, navigate to System >> Log/Monitoring >> Admin Access >> Settings. 1. Check the box under the section "Select Events to Log" for "Administrator Logins". 2. Click "Save Changes".

b
The ICS must be configured to limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type.
AC-10 - Medium - CCI-000054 - V-258622 - SV-258622r930554_rule
RMF Control
AC-10
Severity
Medium
CCI
CCI-000054
Version
IVCS-NM-000690
Vuln IDs
  • V-258622
Rule IDs
  • SV-258622r930554_rule
Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administrator based on account type, role, or access type is helpful in limiting risks related to DoS attacks. This requirement addresses concurrent sessions for administrative accounts and does not address concurrent sessions by a single administrator via multiple administrative accounts. The maximum number of concurrent sessions should be defined based upon mission needs and the operational environment for each system. At a minimum, limits must be set for SSH, HTTPS, account of last resort, and root account sessions.
Checks: C-62362r930552_chk

In the ICS Web UI, navigate to Administrators &gt;&gt; Admins Realms &gt;&gt; Admin Realms. 1. Click the configured admin realm being used for CAC/PKI token admin logins. 2. Click the "Authentication Policy" tab. 3. Click "Limits". If there is any number other than 1 in "Maximum number of sessions per user", this is a finding.

Fix: F-62271r930553_fix

In the ICS Web UI, navigate to Administrators >> Admins Realms >> Admin Realms. 1. Click the configured admin realm being used for CAC/PKI token admin logins. 2. Click the "Authentication Policy" tab, then click "Limits". 3. In "Maximum number of sessions per user", type the number "1". 4. Click "Save Changes".

b
The ICS must be configured to display the Standard Mandatory DOD Notice and Consent Banner before granting access to manage the device.
AC-8 - Medium - CCI-000048 - V-258623 - SV-258623r930557_rule
RMF Control
AC-8
Severity
Medium
CCI
CCI-000048
Version
IVCS-NM-000710
Vuln IDs
  • V-258623
Rule IDs
  • SV-258623r930557_rule
Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. System use notifications are required only for access via logon interfaces with human users. The banner is retained until acknowledgement by default when the banner is selected in the sign-in policy. Satisfies: SRG-APP-000068-NDM-000215, SRG-APP-000069-NDM-000216
Checks: C-62363r930555_chk

Determine if the network device is configured to present a DOD-approved banner that is formatted in accordance with DTM-08-060. In the ICS Web UI, navigate to Authentication &gt;&gt; Signing In &gt;&gt; Sign-In Policies/ 1. Click the */admin/ (or whatever custom URL is used for CAC/PKI token admin access). 2. Verify the DOD banner is entered exactly as required with no alterations. "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests -- not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details". If the banner is not used, displayed, or the text/format is altered, this is a finding.

Fix: F-62272r930556_fix

Configure ICS to present a DOD-approved banner that is formatted in accordance with DTM-08-060. Do not alter the text or format. Configure */admin/ (or whatever custom URL is used for CAC/PKI token admin access) with a sign-in notice. In the ICS Web UI, navigate to Authentication >> Signing In >> Sign-In Notifications. 1. Click "New Notification". 2. For name, type: "DOD Notice and Consent". 3. In the text box type the following: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests -- not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details". 4. Click "Save Changes". 5. Go to Authentication >> Signing In >> Sign-In Policies. 6. Click the */admin/ (or whatever custom URL is used for CAC/PKI token admin access). 7. Under "Configure SignIn Notifications", check the box for "Pre-Auth Sign-in Notification", and in the drop-down menu, assign the notification titled "DOD Notice and Consent".

b
The ICS must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.
AC-7 - Medium - CCI-000044 - V-258624 - SV-258624r930560_rule
RMF Control
AC-7
Severity
Medium
CCI
CCI-000044
Version
IVCS-NM-000720
Vuln IDs
  • V-258624
Rule IDs
  • SV-258624r930560_rule
By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
Checks: C-62364r930558_chk

In the ICS Web UI, navigate to Authentication &gt;&gt; Auth Servers &gt;&gt; Administrators. 1. Under the section "Account Lockout", verify "Enable Account Lockout for users" is checked. 2. Under the section "Account Lockout", verify "Maximum wrong password attempts" is set to "3". 3. Under the section "Account Lockout", verify "Account Lockout Period in Minutes" is set to "15". If the ICS must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes, this is a finding.

Fix: F-62273r930559_fix

In the ICS Web UI, navigate to Authentication >> Auth Servers >> Administrators. 1. Under the section "Account Lockout", check the box for "Enable Account Lockout for users". 2. Under the section "Account Lockout", set the box "Maximum wrong password attempts" to "3". 3. Under the section "Account Lockout", set the box "Account Lockout Period in Minutes" to "15". 4. Click "Save Changes".

b
The ICS must be configured to conduct backups of system level information contained in the information system when changes occur.
CM-6 - Medium - CCI-000366 - V-258625 - SV-258625r930563_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
IVCS-NM-000740
Vuln IDs
  • V-258625
Rule IDs
  • SV-258625r930563_rule
System-level information includes default and customized settings and security attributes, including ACLs that relate to the network device configuration, as well as software required for the execution and operation of the device. Information system backup is a critical step in ensuring system integrity and availability. If the system fails and there is no backup of the system-level information, a denial of service condition is possible for all who utilize this critical network component. This control requires the network device to support the organizational central backup process for system-level information associated with the network device. This function may be provided by the network device itself; however, the preferred best practice is a centralized backup rather than each network device performing discrete backups.
Checks: C-62365r930561_chk

In the ICS Web UI, navigate to Maintenance &gt;&gt; Archiving &gt;&gt; Archive Servers. Under "Archive Settings", if there is no archive server configured, this is a finding. Under "Archive Schedule", if "Archive System Configuration", and "Archive User Accounts" are not selected, this is a finding. Under "Archive Schedule", if "Archive System Configuration", and "Archive User Accounts" are not configured at a specific time and day of the week, this is a finding. Under "Archive Schedule", if "Archive System Configuration", and "Archive User Accounts" are not configured with a password for backup encryption, this is a finding.

Fix: F-62274r930562_fix

In the ICS Web UI, navigate to Maintenance >> Archiving >> Archive Servers. 1. Click "SCP" if using an SFTP/SCP server, other mechanisms may not be allowed due to local security policy. Check with the ISSM before configuring anything other than SCP. 2. Under "Archive Server", type the hostname or IPv4/IPv6 address. 3. In "Destination Directory" type the path of the backup (e.g., "/backupfolder/ics/"). 4. In the "Username" field, type the username with SCP/SFTP permissions on the backup server. 5. In the "Password" field, type the password. 6. Under "Archive Schedule", select "Archive System Configuration", then click the day of the week and time when the backup should be sent. 7. Under "Archive System Configuration", ensure a password is given to encrypt the backup. 8. Under "Archive Schedule", select "Archive User Accounts", then click the day of the week and time when the backup should be sent. 9. Under "Archive User Accounts", ensure a password is given to encrypt the backup. 10. Click "Save Changes".