Ivanti Connect Secure VPN Security Technical Implementation Guide

  • Version/Release: V1R1
  • Published: 2023-10-17
  • Expand All:
  • Severity:
  • Sort:
Compare

Select any two versions of this STIG to compare the individual requirements

View

Select any old version/release of this STIG to view the previous requirements

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
b
The ICS must be configured to ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies.
AC-4 - Medium - CCI-001414 - V-258583 - SV-258583r930437_rule
RMF Control
AC-4
Severity
Medium
CCI
CCI-001414
Version
IVCS-VN-000010
Vuln IDs
  • V-258583
Rule IDs
  • SV-258583r930437_rule
Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth and other resources. VPN traffic received from another enclave with different security policy or level of trust must not bypass be inspected by the firewall before being forwarded to the private network.
Checks: C-62323r930435_chk

In the ICS Web UI, navigate to Users >> Resource Policies >> VPN Tunneling >> Access Control. 1. Verify that an Access Control Policy exists. 2. Verify the Access Control Policy is not configured to allows all IPv4/IPv6 addresses or all TCP/UDP ports. If the ICS does not use one or more Access Control Policies to restrict inbound and outbound traffic compliance with the sites documented information flow control policy, this is a finding.

Fix: F-62232r930436_fix

Establish Access Control policy in accordance with the site's system security plan. Policies will vary based on security policies and architecture. In the ICS Web UI, navigate to Users >> Resource Policies >> VPN Tunneling >> Access Control. 1. Click "New Policy". 2. Enter a name. 3. Under IPv4 Resources, add all allowed ports and protocols required for users. Examples provided below: - For ICMP configure the following: icmp://10.0.0.0/255.255.255.0 to allow ICMP communications for the 10.0.0.0/24 subnet. - For TCP configure the following: tcp://*:80,443 to allow TCP communications for all IPv4 addresses going to TCP port 80 and 443 (web traffic). - For UDP configure the following: udp://10.0.0.0/255.255.255.0:53,123 to allow UDP communications for the 10.0.0.0/24 IPv4 addresses going to UDP port 53 (DNS) and 123 (NTP). 4. Under IPv6 Resources, add all allowed ports and protocols required for users. Examples provided below: - For ICMP configure the following: icmpv6://[2001:db8:1::/64] to allow ICMPv6 communications for the 2001:db8:1::/64 subnet. - For TCP configure the following: tcp://[*]:80,443 to allow TCP communications for all IPv6 addresses going to TCP port 80 and 443 (web traffic). - For UDP configure the following: udp://[2001:db8:2::/64]:53,123 to allow UDP communications for the 2001:db8:2::/64 IPv6 addresses going to UDP port 53 (DNS) and 123 (NTP). 5. For FQDN, add specific URLs to allow, if needed. 6. Select "Policy applies to SELECTED roles" and select the role that remote access VPN users are assigned. If there are multiple, select each one and click "Add". 7. Click "Allow Access". 8. Click "Save Changes".

b
The ICS must display the Standard Mandatory DOD Notice and Consent Banner before granting access to users.
AC-8 - Medium - CCI-000048 - V-258584 - SV-258584r930440_rule
RMF Control
AC-8
Severity
Medium
CCI
CCI-000048
Version
IVCS-VN-000020
Vuln IDs
  • V-258584
Rule IDs
  • SV-258584r930440_rule
Display of the DOD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. Satisfies: SRG-NET-000041-VPN-000110, SRG-NET-000042-VPN-000120, SRG-NET-000043-VPN-000130
Checks: C-62324r930438_chk

Determine if the network device is configured to present a DOD-approved banner that is formatted in accordance with DTM-08-060. Verify the remote access VPN user access sign-in notice is configured and displayed. This may or may not be the same as the admin portal. 1. In the ICS Web UI, navigate to Authentication >> Signing In >> Sign-In Notifications. Verify the use of the following verbiage for applications that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details". Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't". 2. In the ICS Web UI, navigate to Authentication >> Signing In >> Sign-In Policies. 3. Click the "*/" (or whatever custom URL is used for remote access VPN user access). Under "Configure SignIn Notifications", if the "Pre-Auth Sign-in Notification" is not checked, or if the previously mentioned notification text is not assigned to this policy, this is a finding.

Fix: F-62233r930439_fix

Configured to present a DOD-approved banner that is formatted in accordance with DTM-08-060. Configure the remote access VPN user access sign-in notice. This may or may not be the same as the admin portal. In the ICS Web UI, navigate to Authentication >> Signing In >> Sign-In Notifications. 1. Click "New Notification". 2. For name, type: "DOD Notice and Consent". 3. In the text box type the following: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: - The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. - At any time, the USG may inspect and seize data stored on this IS. - Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. - This IS includes security measures (e.g., authentication and access controls) to protect USG interests -- not for your personal benefit or privacy. - Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details". 4. Click "Save Changes". 5. Go to Authentication >> Signing In >> Sign-In Policies. 6. Click the "*/" (or whatever custom URL is used for remote access VPN user access). 7. Under "Configure SignIn Notifications", check the box for "Pre-Auth Sign-in Notification" in the drop-down menu, and assign the notification titled "DOD Notice and Consent".

b
The ICS must be configured to limit the number of concurrent sessions for user accounts to one.
AC-10 - Medium - CCI-000054 - V-258585 - SV-258585r930443_rule
RMF Control
AC-10
Severity
Medium
CCI
CCI-000054
Version
IVCS-VN-000050
Vuln IDs
  • V-258585
Rule IDs
  • SV-258585r930443_rule
VPN gateway management includes the ability to control the number of users and user sessions that utilize a VPN gateway. Limiting the number of allowed users and sessions per user is helpful in limiting risks related to DoS attacks. This requirement addresses concurrent sessions for information system accounts and does not address concurrent sessions by single users via multiple system accounts. The maximum number of concurrent sessions should be defined based upon mission needs and the operational environment for each system. The intent of this policy is to ensure the number of concurrent sessions is deliberately set to a number based on the site's mission and not left unlimited.
Checks: C-62325r930441_chk

In the ICS Web UI, navigate to Users >> User Realms >> User Realms. 1. If using the default user realm, click "User". Otherwise, click the configured user realm that will be used for user remote access VPN using DOD CAC authentication. 2. Click the "Authentication Policy" tab, then click "Limits". If the ICS does not limit the number of concurrent sessions for user accounts to "1", this is a finding.

Fix: F-62234r930442_fix

In the ICS Web UI, navigate to Users >> User Realms >> User Realms. 1. If using the default user realm, click "User". Otherwise, click the configured user realm that will be used for user remote access VPN using DOD CAC authentication. 2. Click the "Authentication Policy" tab, then click "Limits". 3. In "Maximum number of sessions per user", type the number "1". 4. Click "Save Changes".

c
The ICS must be configured to use TLS 1.2, at a minimum.
AC-17 - High - CCI-000068 - V-258586 - SV-258586r930446_rule
RMF Control
AC-17
Severity
High
CCI
CCI-000068
Version
IVCS-VN-000060
Vuln IDs
  • V-258586
Rule IDs
  • SV-258586r930446_rule
Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that exploit vulnerabilities in this protocol. NIST SP 800-52 Rev2 provides guidance for client negotiation on either DOD-only or public-facing servers. Satisfies: SRG-NET-000062-VPN-000200, SRG-NET-000371-VPN-001650, SRG-NET-000530-VPN-002340, SRG-NET-000540-VPN-002350
Checks: C-62326r930444_chk

Determine if the ICS uses TLS 1.2 to protect remote access transmissions. In the ICS Web UI, navigate to System >> Configuration >> Inbound SSL Options. 1. Under Allowed SSL and TLS Version, verify "Accept only TLS 1.2 (maximize security)" is checked. 2. Navigate to System >> Configuration >> Outbound SSL Options. 3. Under Allowed SSL and TLS Version, verify "Accept only TLS 1.2 (maximize security)" is checked. If the ICS does not use TLS 1.2, at a minimum, this is a finding.

Fix: F-62235r930445_fix

Configure the ICS to uses TLS 1.2 to protect remote access transmissions. In the ICS Web UI, navigate to System >> Configuration >> Inbound SSL Options. 1. Under Allowed SSL and TLS Version, check the box for "Accept only TLS 1.2 (maximize security)". 2. Click "Save Changes". 3. Click "Proceed" for acceptance of Cipher Change. Navigate to System >> Configuration >> Outbound SSL Options. 1. Under Allowed SSL and TLS Version, check the box for "Accept only TLS 1.2 (maximize security)". 2. Click "Save Changes". 3. Click "Proceed" for acceptance of Cipher Change.

a
The ICS must be configured to generate log records containing sufficient information about where, when, identity, source, or outcome of the events.
AU-3 - Low - CCI-000130 - V-258587 - SV-258587r930449_rule
RMF Control
AU-3
Severity
Low
CCI
CCI-000130
Version
IVCS-VN-000090
Vuln IDs
  • V-258587
Rule IDs
  • SV-258587r930449_rule
Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. VPN gateways often have a separate audit log for capturing VPN status and other information about the traffic (as opposed to the log capturing administrative and configuration actions). Associating event types with detected events in the network audit logs provides a means of investigating an attack, recognizing resource utilization or capacity thresholds, or identifying an improperly configured VPN gateway. Satisfies: SRG-NET-000078-VPN-000290, SRG-NET-000079-VPN-000300, SRG-NET-000088-VPN-000310, SRG-NET-000089-VPN-000330, SRG-NET-000091-VPN-000350, SRG-NET-000077-VPN-000280, SRG-NET-000313-VPN-001050, SRG-NET-000492-VPN-001980
Checks: C-62327r930447_chk

In the ICS Web UI, navigate to System >> Log/Monitoring >> User Access >> Settings. Under "Select Events to Log", verify all items are checked. If the ICS must be configured to generate log records containing information investigate the events, this is a finding.

Fix: F-62236r930448_fix

In the ICS Web UI, navigate to System >> Log/Monitoring >> User Access >> Settings. 1. Under "Select Events to Log", check all items. 2. Set the standard filer. 3. Click "Add". 4. Click "Save Changes". Note: If the site uses SNMP, the configuration can be used in conjunction with this requirement which is recommended. By default, SNMP is disabled. The device only supports Simple Network Management Protocol version 3 (SNMPv3) in a DOD configuration. The device supports queries only, traps only, or both when enabling SNMP. Refer to SRG-NET-000335-VPN-001270 for configuration.

b
The ICS must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
IA-2 - Medium - CCI-000764 - V-258588 - SV-258588r930452_rule
RMF Control
IA-2
Severity
Medium
CCI
CCI-000764
Version
IVCS-VN-000180
Vuln IDs
  • V-258588
Rule IDs
  • SV-258588r930452_rule
To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors). Organizational users (and any processes acting on behalf of users) must be uniquely identified and authenticated for all accesses except the following. (i) Accesses explicitly identified and documented by the organization. Organizations document specific user actions that can be performed on the information system without identification or authentication; and (ii) Accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals' in-group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity. This requirement only applies to components where this is specific to the function of the device or has the concept of an organizational user (e.g., VPN or proxy capability). This does not apply to authentication for the purpose of configuring the device itself (i.e., device management).
Checks: C-62328r930450_chk

In the ICS Web UI, navigate to Users >> User Realms >> User Realms. 1. Click the user realm that is currently being used on the ICS for standard remote access VPN logins. 2. View "General" tab, under Servers >> Authentication. Verify a certificate authentication server is configured. 3. View "General" tab, under Servers >> Directory/Attribute. Verify there is an entry defined. 4. View "Role Mapping" tab, under "when users meet these conditions", verify "Group" is used with the local user active directory group selected and assigned to the role that was created. If the ICS does not use DOD PKI for network access to nonprivileged accounts, this is a finding.

Fix: F-62237r930451_fix

Configure an authentication server for the user realm. In the ICS Web UI, navigate to Users >> User Realms >> User Realms. 1. Click the user realm that is currently being used on the ICS for standard remote access VPN logins. 2. In the "General" tab, under Servers >> Authentication. 3. Click "New Servers". Under "server type", select Certificate Server >> New Server. 4. Type a Name, then under User Name template type this exactly: <certAttr.altname.UPN> 5. Click "Save Changes". 6. Navigate to Authentication >> Auth Servers. 7. Click "New Servers". Under "server type", select LDAP Server >> New Server. 8. Type a name for the primary LDAP server domain. 9. LDAP server: the FQDN of the server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 10. LDAP port: 636 (this is for LDAPS). 11. Backup LDAP Server1: the FQDN of the secondary server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 12. Backup LDAP Port1: 636. 13. If a third LDAP server is needed, add this and the port info under Backup LDAP Server2 and Backup LDAP Port2. 14. LDAP Server Type: Active Directory. 15. Connection: LDAPS. 16. Ensure "Validate Server Certificate" is checked. 17. Connection Timeout: 15. 18. Search Timeout: 60. 19. Scroll down to the bottom and click "Save Changes". Click "Test Settings" to ensure valid communications are possible. NOTE: If there are failures in this testing, ensure that the step for Device Certificates and Trusted Server CAs were completed, as this will cause LDAPS certificate issues. 20. Under "authentication required", click the box for "Authentication required" to search LDAP. 21. Enter the service account's Admin DN using this as an example format: CN=PCS.SVC,OU=IVANTI,DC=DOD,DC=mil 22. Enter the service account's password. 23. Under "Finding user entries", add the base DN of the domain as an example format: DC=DOD,DC=mil 24. Under "filter", use this specific attribute configuration: userPrincipalName=<USER> 25. Under "group membership", add the base DN of where admin users that will access, using this as an example format: OU=IVANTI,DC=DOD,DC=mil 26. Under "filter", use the following: cn=<GROUPNAME> 27. Under "member attribute", use the following: member. 28. Click "Save Changes". 29. In the same LDAP server configuration screen, scroll down and click the "Server Catalog" hyperlink. 30. Under "attributes", click "New", Type: userPrincipalName, and click "Save Changes". 31. Under "groups", click "Search". In the search box, type the group name used for user logins. 32. Check the box next to the group that is found and click "Add Selected". 33. Repeat these steps for all various groups needed for various user/computer roles on the ICS system. 34. Click "Save Changes".

c
The ICS must be configured to use multifactor authentication (e.g., DOD PKI) for network access to nonprivileged accounts.
IA-2 - High - CCI-000766 - V-258589 - SV-258589r930455_rule
RMF Control
IA-2
Severity
High
CCI
CCI-000766
Version
IVCS-VN-000190
Vuln IDs
  • V-258589
Rule IDs
  • SV-258589r930455_rule
To ensure accountability and prevent unauthenticated access, nonprivileged users must use multifactor authentication to prevent potential misuse and compromise of the system. Multifactor authentication uses two or more factors to achieve authentication. Use of password for user remote access for nonprivileged account is not authorized. Factors include: (i) Something you know (e.g., password/PIN); (ii) Something you have (e.g., cryptographic identification device, token); or (iii) Something you are (e.g., biometric). A nonprivileged account is any information system account with authorizations of a nonprivileged user. Network access is any access to a network element by a user (or a process acting on behalf of a user) communicating through a network. The DOD CAC with DOD-approved PKI is an example of multifactor authentication. Satisfies: SRG-NET-000140-VPN-000500, SRG-NET-000342-VPN-001360
Checks: C-62329r930453_chk

In the ICS Web UI, navigate to Users &gt;&gt; User Realms &gt;&gt; User Realms. 1. Click the user realm that is currently being used on the ICS for standard remote access VPN logins. 2. View "General" tab, under Servers &gt;&gt; Authentication. Verify a certificate authentication server is configured. 3. View "General" tab, under Servers &gt;&gt; Directory/Attribute. Verify there is an entry defined. 4. View "Role Mapping" tab, under "when users meet these conditions", verify "Group" is used with the local user active directory group selected and assigned to the role that was created. If the ICS does not use DOD PKI for network access to nonprivileged accounts, this is a finding.

Fix: F-62238r930454_fix

Configure the user realm to use DOD PKI and the site's authentication servers. A sign-in policy is then applied in accordance with the site's access configuration. The focus for this requirement is on the path so the installation of the device certificates is not included. In the ICS Web UI, navigate to Authentication >> Auth Servers. 1. Click "New Servers". Under "server type", select Certificate Server >> New Server. 2. Type a Name. Under User Name template type this exactly: <certAttr.altname.UPN> 3. Click "Save Changes". 4. Navigate to Authentication >> Auth Servers. 5. Click "New Servers". Under "server type", select LDAP Server >> New Server. 6. Type a name for the primary LDAP server domain. 7. LDAP server: the FQDN of the server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 8. LDAP port: 636 (this is for LDAPS). 9. Backup LDAP Server1: the FQDN of the secondary server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 10. Backup LDAP Port1: 636. 11. If a third LDAP server is needed, add this and the port info under Backup LDAP Server2 and Backup LDAP Port2. 12. LDAP Server Type: Active Directory. 13. Connection: LDAPS. 14. Ensure Validate Server Certificate is checked. 15. Connection Timeout: 15. 16. Search Timeout: 60. 17. Scroll down to the bottom and click "Save Changes". Click "Test Settings" to ensure valid communications are possible. NOTE: If there are failures in this testing, ensure that the step for Device Certificates and Trusted Server CAs were completed as this will cause LDAPS certificate issues. 18. Under authentication required, click the box for Authentication required to search LDAP. 19. Enter the service account's Admin DN using this as an example format: CN=PCS.SVC,OU=IVANTI,DC=DOD,DC=mil 20. Enter the service account's password. 21. Under "Finding user entries", add the base DN of the domain as an example format: DC=DOD,DC=mil 22. Under "filter", use this specific attribute configuration: userPrincipalName=<USER> 23. Under "group membership", add the base DN of where admin users that will access, using this as an example format: OU=IVANTI,DC=DOD,DC=mil 24. Under "filter", use the following: cn=<GROUPNAME> 25. Under "member attribute", use the following: member. 26. Click "Save Changes". 27. Now back in the same LDAP server configuration screen, scroll down and click the "Server Catalog" hyperlink. 28. Under "attributes", click "New", Type: userPrincipalName, and click "Save Changes". 29. Under "groups", click "Search". In the search box, type the group name used for user logins. 30. Check the box next to the group that is found and click "Add Selected". 31. Repeat these steps for all various groups needed for various user/computer roles on the ICS system. In the ICS Web UI, navigate to Users >> Users Realms. 1. Click the user realm being used for remote access VPN logins. 2. Under "servers", go to "Authentication" and select the certificate authentication realm created that included the customized User template of <certAttr.altname.UPN>. 3. Under "Directory/Attribute", select the previously created LDAP server. 4. Check the box for "Enable dynamic policy evaluation". 5. Check both the "Refresh roles" and "refresh resource policies". 6. Click "Save Changes". 7. Go to the "Role Mapping" tab. 8. Click "New Rule". 9. Select "Rule based on Group Membership" and click "Update". 10. Type a name for this rule. 11. Select "is". 12. Type the group name exactly as it appears as the CN LDAP attribute. 13. Select the role needed for these VPN logins. 14. Click "Save Changes".

b
The ICS, when utilizing PKI-based authentication, must be configured to validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
IA-5 - Medium - CCI-000185 - V-258590 - SV-258590r930458_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000185
Version
IVCS-VN-000210
Vuln IDs
  • V-258590
Rule IDs
  • SV-258590r930458_rule
Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. To meet this requirement, the information system must create trusted channels between itself and remote trusted authorized IT product (e.g., syslog server) entities that protect the confidentiality and integrity of communications. The information system must create trusted paths between itself and remote administrators and users that protect the confidentiality and integrity of communications. A trust anchor is an authoritative entity represented via a public key and associated data. It is most often used in the context of public key infrastructures, X.509 digital certificates, and DNSSEC. However, applications that do not use a trusted path are not approved for nonlocal and remote management of DOD information systems. Use of SSHv2 to establish a trusted channel is approved. Use of FTP, TELNET, HTTP, and SNMPV1 is not approved since they violate the trusted channel rule set. Use of web management tools that are not validated by common criteria may also violate the trusted channel rule set. When there is a chain of trust, usually the top entity to be trusted becomes the trust anchor; it can be, for example, a Certification Authority (CA). A certification path starts with the subject certificate and proceeds through a number of intermediate certificates up to a trusted root certificate, typically issued by a trusted CA. This requirement verifies that a certification path to an accepted trust anchor is used for certificate validation and that the path includes status information. Path validation is necessary for a relying party to make an informed trust decision when presented with any certificate not already explicitly trusted. Status information for certification paths includes certificate revocation lists or online certificate status protocol responses. Validation of the certificate status information is out of scope for this requirement. Satisfies: SRG-NET-000164-VPN-000560, SRG-NET-000512-VPN-002230, SRG-NET-000580-VPN-002410
Checks: C-62330r930456_chk

In the ICS Web UI, navigate to System &gt;&gt; Configuration &gt;&gt; Certificates &gt;&gt; Trusted Client CAs. 1. Click the first DOD client CA. 2. Verify the item "Use OCSP with CRL fallback" is selected under the "Client certificate status checking" setting. 3. Check each client certificate CA. Verify the setting "Use OCSP with CRL fallback" is selected. For PKI-based authentication, if the ICS does not validate certificates by constructing a certification path (which includes revocation status information) to an accepted trust anchor, this is a finding.

Fix: F-62239r930457_fix

Configure status checking on the ICS. The focus for this requirement is on the path, so the installation of the device certificates is not included. In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Trusted Client CAs. 1. Click the first DOD client CA. 2. Enable "Use OCSP with CRL fallback" under "Client certificate status checking". 3. Repeat these steps for every remaining client certificate CA.

b
The ICS must terminate remote access network connections after an organization-defined time period.
AC-11 - Medium - CCI-000057 - V-258591 - SV-258591r930461_rule
RMF Control
AC-11
Severity
Medium
CCI
CCI-000057
Version
IVCS-VN-000260
Vuln IDs
  • V-258591
Rule IDs
  • SV-258591r930461_rule
This SRG requirement is in response to the DoD OIG Audit of Maintaining Cybersecurity in the Coronavirus Disease-2019 Telework Environment. Best practice is to terminate inactive user sessions after a period; however, when setting timeouts to any VPN connection, the organization must take into consideration the risk to the mission and the purpose of the VPN. VPN connections that provide user access to the network are the prime candidates for VPN session termination and are the primary focus of this requirement. To determine if and when the VPN connections warrant termination, the organization must perform a risk assessment to identify the use case for the VPN and determine if periodic VPN session termination puts the mission at significant risk. The organization must document the results and the determination of the risk assessment in the VPN section of the SSP. The organization must also configure VPN session terminations in accordance with the risk assessment. This SRG requirement is in response to the DOD OIG Audit of Maintaining Cybersecurity in the Coronavirus Disease-2019 Telework Environment. Best practice is to terminate inactive user sessions after a period; however, when setting timeouts to any VPN connection, the organization must take into consideration the risk to the mission and the purpose of the VPN. VPN connections that provide user access to the network are the prime candidates for VPN session termination and are the primary focus of this requirement. To determine if and when the VPN connections warrant termination, the organization must perform a risk assessment to identify the use case for the VPN and determine if periodic VPN session termination puts the mission at significant risk. The organization must document the results and the determination of the risk assessment in the VPN section of the SSP. The organization must also configure VPN session terminations in accordance with the risk assessment. Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port that has been left unattended. In addition, quickly terminating an idle session will also free up resources committed by the managed network element. Terminating network connections associated with communications sessions includes, for example, de-allocating associated TCP/IP address/port pairs at the operating system level, and de-allocating networking assignments at the application level if multiple application sessions are using a single, operating system level network connection. This requirement applies to any network element that tracks individual sessions (e.g., stateful inspection firewall, ALG, or VPN).
Checks: C-62331r930459_chk

Verify the user role being used for CAC/PKI token VPN client logins is configured with a session timeout. In the ICS Web UI, navigate to Administrators &gt;&gt; Users Roles &gt;&gt; User Roles. 1. Click the configured user role being used for CAC/PKI token VPN client logins. 2. Click the "Session Options" tab. In the "Session Lifetime" section, if Idle Timeout is not set to "10", this is a finding.

Fix: F-62240r930460_fix

Configure the user role being used for CAC/PKI token VPN client logins with a session timeout. In the ICS Web UI, navigate to Administrators >> Users Roles >> User Roles. 1. Click the configured user role being used for CAC/PKI token VPN client logins. 2. Click the "Session Options" tab. 3. In the "Session Lifetime" section, set the Idle Timeout to "10". 4. Click "Save Changes".

b
The ICS must be configured to send user traffic log data to redundant central log server.
AU-4 - Medium - CCI-001851 - V-258592 - SV-258592r930464_rule
RMF Control
AU-4
Severity
Medium
CCI
CCI-001851
Version
IVCS-VN-000305
Vuln IDs
  • V-258592
Rule IDs
  • SV-258592r930464_rule
The aggregation of log data kept on a syslog server can be used to detect attacks and trigger an alert to the appropriate security personnel. The stored log data can used to detect weaknesses in security that enable the network IA team to find and address these weaknesses before breaches can occur. Reviewing these logs, whether before or after a security breach, are important in showing whether someone is an internal employee or an outside threat. This requirement applies only to components where this is specific to the function of the device (e.g., IDPS sensor logs, firewall logs). This does not apply to audit logs generated on behalf of the device itself (management).
Checks: C-62332r930462_chk

Verify user access log events are being sent to the central log server. In the ICS Web UI, navigate to System &gt;&gt; Log/Monitoring &gt;&gt; User Access &gt;&gt; Settings. 1. Under "Select Events to Log", verify all items are checked. 2. Under "Syslog Servers", verify redundant server name/IP address, facility of LOCAL0, type TLS, and the source interface are defined. If the ICS must be configured to send admin log data to redundant central log server, this is a finding.

Fix: F-62241r930463_fix

Direct user access log events to the central log server. In the ICS Web UI, navigate to System >> Log/Monitoring >> User Access >> Settings. 1. Under "Select Events to Log", check all items. 2. Under "Syslog Servers", add an IP address/server name/IP. 3. Set the facility to "LOCAL0". 4. Set type to "TLS". 5. If a client cert is required for the syslog server, select the client certificate to use for the syslog traffic. If none exists, import the DOD-signed client key pair to the ICS under System >> Configuration >> Certificates >> Client Auth Certificates. 6. Set the standard filer. 7. Set the source interface as either the management or internal interface. 8. Click "Add". 9. Click "Save Changes". 10. Repeat these steps to add a redundant syslog server for user log events.

b
The ICS must be configured to forward all log failure events where the detection and/or prevention function is unable to write events to local log record or send an SNMP trap that can be forwarded to the SCA and ISSO.
AU-5 - Medium - CCI-001858 - V-258593 - SV-258593r930467_rule
RMF Control
AU-5
Severity
Medium
CCI
CCI-001858
Version
IVCS-VN-000310
Vuln IDs
  • V-258593
Rule IDs
  • SV-258593r930467_rule
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impending failure of the audit capability and system operation may be adversely affected. Alerts provide organizations with urgent messages. Automated alerts can be conveyed in a variety of ways, including, for example, telephonically, via electronic mail, via text message, or via websites. Log processing failures include software/hardware errors, failures in the log capturing mechanisms, and log storage capacity being reached or exceeded. The VPN daemon facility and log facility are messages in the log, which capture actions performed or errors encountered by system processes.
Checks: C-62333r930465_chk

If SNMP is used, verify the configuration is compliant. If SNMP is not used, this is not a finding. In the ICS Web UI, navigate to System &gt;&gt; Log/Monitoring &gt;&gt; SNMP. 1. Under "Agent Properties", verify "SNMP Traps" is checked. 2. Under "SNMP Version data", verify "v3" is selected. 3. Under "User 1", verify a user configuration in AuthPriv is using at least SHA and CFB-AES-128. 4. Verify "Optional Traps Critical and Major Log Events" are checked. 5. Verify the SNMP server IPv4/IPv6 address is configured under "SNMP Trap Servers". If SNMP is incorrectly configured, this is a finding.

Fix: F-62242r930466_fix

Event logs are also updated to local logs by default in addition to the central syslog server. However, if the site uses SNMP, the following must be configured since SNMP is disabled by default. In the ICS Web UI, navigate to System >> Log/Monitoring >> SNMP. 1. Under "SNMP Version data", select "v3". 2. Under "Agent Properties", check "SNMP Traps". 3. Under "Agent Properties", configure a System Name, Location, and Contact. 4. Under "User 1", type in a valid username. Select "AuthPriv". - The auth protocol must be set to at least SHA. Type the Auth Password. - The priv protocol must be set to at least CFB-AES-128. Type in the priv password. 5. Under "Trap Thresholds", ensure "Check Frequency" is 180 seconds, "Log Capacity" is 75%, "Users" is 100%, "Physical Memory" is 0%, "Swap Memory" is 0%, "Disk" is 75%, "CPU" is 0%, and "Meeting Users" is 100%. 6. Under "Optional Traps", check the boxes for "Critical and Major Log Events". 7. Under "SNMP Trap Servers", configure an IPv4/IPv6 address for the valid trap server/receiver, type in the port (default is 162), and select the user to use (use the user from step #4 above).

b
The ICS must be configured to authenticate all clients before establishing a connection.
IA-3 - Medium - CCI-001958 - V-258594 - SV-258594r930470_rule
RMF Control
IA-3
Severity
Medium
CCI
CCI-001958
Version
IVCS-VN-000340
Vuln IDs
  • V-258594
Rule IDs
  • SV-258594r930470_rule
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. For ICS, user authentication uses authentication servers, realms, roles, and sign-in policies. To the device, both machine and user authentication are treated as user logins and certificates (machine certs and CAC) are supported for authentication. Although both machine and human users are considered "users" to the device. The system supports separating admin from user/computer authentication by duplicating auth servers and only associating a single server to an admin realm or a user realm but not both. This supports the DOD best practice of authenticating admin authentication using a separate authentication server from user authentication.
Checks: C-62334r930468_chk

Verify client certificates are installed and assigned to applicable user/computer realm to enable client authentication for all remote clients. In the Ivanti ICS Web UI, navigate to Users &gt;&gt; User Realms &gt;&gt; User Realms. 1. Click the user realm that is currently being used on the ICS for standard remote access VPN logins. 2. In the "General" tab, under Servers &gt;&gt; Authentication, verify it is defined with a certificate authenticate server. 3. In the "General" tab, under Servers &gt;&gt; Directory/Attribute, verify "none" is not displayed. 4. In the "Role Mapping" tab, under "when users meet these conditions", verify "Group" must be used, and the local site's administrator active directory group must be selected and assigned to the role that was created. If the ICS is not configured to authenticate all client devices before establishing a connection, this is a finding.

Fix: F-62243r930469_fix

Configure client certificates and enable them on an appropriate user/computer realm to enable client authentication. In the Ivanti ICS Web UI, navigate to System >> Configuration >> Certificates >> Trusted Server CAs. 1. Click "Import Trusted Server CAs". 2. Import the Active Directory root CA certificate by clicking "Browse", selecting the certificate file, and clicking "Import Certificate". 3. Repeat these steps for the intermediate CA certificate. NOTE: these certificates could be DOD-signed CA certificates, or they could be internal private CA certificates. Import certificates based on the use case of the site. In the Ivanti ICS Web UI, navigate to System >> Configuration >> Certificates >> Trusted Client CAs. 1. Click "Import CA Certificate". 2. Import the DOD Client CAC root CA certificate by clicking "Browse", selecting the certificate file, and clicking "Import Certificate" (e.g., "DOD Root CA 3"). 3. Repeat these steps for the intermediate/issuing CAC CA certificate (e.g., "DOD ID CA 59"). 4. Repeat these steps for each intermediate CAC CA certificate. 5. Click the Root CA certificate that was imported. 6. Under client certificate status checking, ensure the following is set: - Use OCSP with CRL Fallback. - "Trusted for client Authentication" must be checked. 7. Optionally, if the network the site is in must use a local OCSP repeater/responder, go to OCSP settings. Otherwise, move on to the Device Certificates. 8. Click "OSCP options". Use "Manually Configured" responders. 9. Enter the URL for the primary and backup OCSP responder. 10. Optionally, if the OCSP responder requires request signing and nonce usage, select those here. In the Ivanti ICS Web UI, navigate to System >> Configuration >> Certificates >> Device Certificates. 1. Click "New CSR". 2. Under Common Name, ensure this has the FQDN for the ICS server, then fill out all other items. 3. If using RSA, select "2048". If using ECC, select "P-384". IMPORTANT NOTE: If the remote access VPN is carrying classified data, the certificate and key being used by ICS MUST be an ECC P-384 key pair. 4. Click "Create CSR". Export the CSR and import it into the DOD site's Registration Authority (RA). Ensure that Subject Alternative Names (SANs) are created for all FQDNs, server names, and cluster names on the web enrollment form. 5. Once the certificate is approved, download it and import it in this same section of the ICS. In the Ivanti ICS Web UI, navigate to Authentication >> Auth Servers 1. Click "New Servers". Under "server type", select Certificate Server >> New Server. 2. Type a Name. Under User Name template type this exactly: <certAttr.altname.UPN> 3. Click "Save Changes". 4. Navigate to Authentication >> Auth Servers. 5. Click "New Servers". Under "server type", select LDAP Server >> New Server. 6. Type a name for the primary LDAP server domain. 7. LDAP server: the FQDN of the server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 8. LDAP port: 636 (this is for LDAPS). 9. Backup LDAP Server1: the FQDN of the secondary server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 10. Backup LDAP Port1: 636. 11. If a third LDAP server is needed, add this and the port info under Backup LDAP Server2 and Backup LDAP Port2. 12. LDAP Server Type: Active Directory. 13. Connection: LDAPS. 14. Ensure Validate Server Certificate is checked. 15. Connection Timeout: 15. 16. Search Timeout: 60. 17. Scroll down to the bottom and click "Save Changes". Click "Test Settings" to ensure valid communications are possible. NOTE: If there are failures in this testing ensure that the step for Device Certificates and Trusted Server CAs were completed, as this will cause LDAPS certificate issues. 18. Under authentication required, click the box for "Authentication required" to search LDAP. 19. Enter the service account's Admin DN using this as an example format: CN=PCS.SVC,OU=IVANTI,DC=DOD,DC=mil 20. Enter the service account's password. 21. Under "Finding user entries", add the base DN of the domain as an example format: DC=DOD,DC=mil 22. Under "filter", use this specific attribute configuration: userPrincipalName=<USER> 23. Under "group membership", add the base DN of where admin users that will access, using this as an example format: OU=IVANTI,DC=DOD,DC=mil 24. Under "filter", use the following: cn=<GROUPNAME> 25. Under "member attribute", use the following: member 26. Click Save "Changes". 27. Now back in the same LDAP server configuration screen, scroll down and click the "Server Catalog" hyperlink. 28. Under "attributes", click "New", Type: userPrincipalName, and click "Save Changes". 29. Under "groups", click "Search". In the search box, type the group name used for admin logins. 30. Check the box next to the group that is found and click "Add Selected". 31. Repeat these steps for all various groups needed for various roles on the ICS system. For example, groups for auditors, ISSOs, NOC, SOC, Viewer, etc. 32. Click "Save Changes". In the Ivanti ICS Web UI, navigate to Users >> Users Realms. 1. Click the user realm being used for remote access VPN logins. 2. Under "servers", go to "Authentication" and select the certificate authentication realm created that included the customized User template of <certAttr.altname.UPN>. 3. Under "Directory/Attribute", select the previously created LDAP server. 4. Check the box for "Enable dynamic policy evaluation". 5. Check both the "Refresh roles" and "refresh resource policies". 6. Click "Save Changes". 7. Go to the "Role Mapping" tab. 8. Click "New Rule". 9. Select "Rule based on Group Membership" and click "Update". 10. Type a name for this rule. 11. Select "is". 12. Type the group name exactly as it appears as the CN LDAP attribute. 13. Select the role needed for these VPN logins. 14. Click "Save Changes". In the Ivanti ICS Web UI, navigate to Authentication >> Sign-in >> Sign-in Policies. 1. Create a New URL or edit the */ URL (depending on the site). NOTE: it is recommended to create a new sign-in URL until this configuration is fully tested to ensure there is still web UI reachability in the troubleshooting process. 2. Under authentication realm, click the "User picks from a list of authentication realms". 3. Click "Save Changes". Test and verify the connection with CAC/Alt Token and LDAPS by attempting a remote access VPN web UI login using the token or CAC and entering the sign-in URL. Once successful, the user will click on the ICS client for completing the login connection.

b
The ICS must be configured to use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.
SC-13 - Medium - CCI-002450 - V-258595 - SV-258595r930473_rule
RMF Control
SC-13
Severity
Medium
CCI
CCI-002450
Version
IVCS-VN-000350
Vuln IDs
  • V-258595
Rule IDs
  • SV-258595r930473_rule
Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The National Security Agency/Central Security Service's (NSA/CSS) CSfC Program enables commercial products to be used in layered solutions to protect classified National Security Systems (NSS) data. Currently, Suite B cryptographic algorithms are specified by NIST and are used by NSA's Information Assurance Directorate in solutions approved for protecting classified and unclassified NSS. However, quantum resistant algorithms will be required for future required Suite B implementations. Satisfies: SRG-NET-000352-VPN-001460, SRG-NET-000565-VPN-002400, SRG-NET-000565-VPN-002390
Checks: C-62335r930471_chk

If the ICS VPN Gateway is not being used to carry classified data (e.g., Secret, Top Secret, etc.), this is Not Applicable. 1. Navigate to System &gt;&gt; Configuration &gt;&gt; Inbound SSL Options. Verify that under "Allowed Encryption Strength", if "SuiteB - Accept only SuiteB ciphers" is checked. 2. Navigate to System &gt;&gt; Configuration &gt;&gt; Certificates &gt;&gt; Device Certificates. Verify the certificate being used by the ICS is an ECC P-384 Public Key. If the ICS is not configured to use only SuiteB ciphers with ECC P-384 keys for transporting classified traffic, this is a finding.

Fix: F-62244r930472_fix

In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Device Certificates. 1. Click "New CSR". 2. Add a Common Name in FQDN format. 3. Add a Country code of "US". 4. Under key type, select "ECC". 5. Under the key length, select "P-384". 6. Click "Create CSR". 7. Copy the Base 64/PEM encoded certificate request that is shown on the screen and paste it to a text file. Ensure the file has the file suffix of .csr. 8. Go through the local RA process for DOD Web Server certificate requests. Ensure that SANs are added to the certificate by the issuing CA to include the hostname, cluster names, and all FQDNs. 9. Once the certificate is provided by the CA, go to System >> Configuration >> Certificates >> Device Certificates. 10. Click "Browse" and select the certificate file issued by the CA. Then click "Import". 11. Click "Save Changes". 12. Click on the imported certificate. 13. On the "Internal Port", click "add" for the cluster internal VIP and <Internal Port>. 14. On the "External Port" click "add" for the cluster external VIP and <External Port>. 15. Check the box for "Management Port". 16. Under "Certificate Status Checking", click the box for "Use CRLs". 17. Click "Save Changes". In the ICS Web UI, navigate to System >> Configuration >> Inbound SSL Options. 1. Under "Allowed Encryption Strength", click "SuiteB - Accept only SuiteB ciphers". 2. Click "Save Changes" and accept the cipher suite changes.

b
The ICS must be configured to disable split-tunneling for remote client VPNs.
SC-7 - Medium - CCI-002397 - V-258596 - SV-258596r930476_rule
RMF Control
SC-7
Severity
Medium
CCI
CCI-002397
Version
IVCS-VN-000360
Vuln IDs
  • V-258596
Rule IDs
  • SV-258596r930476_rule
Split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to exfiltration of organizational information. A VPN hardware or software client with split tunneling enabled provides an unsecured backdoor to the enclave from the internet. With split tunneling enabled, a remote client has access to the internet while at the same time has established a secured path to the enclave via an IPsec tunnel. A remote client connected to the internet that has been compromised by an attacker on the internet, provides an attack base to the enclave's private network via the IPsec tunnel. Hence, it is imperative that the VPN gateway enforces a no split-tunneling policy to all remote clients.
Checks: C-62336r930474_chk

In the ICS Web UI, navigate to Users &gt;&gt; Resource Policies &gt;&gt; Split Tunneling Networks. If there are any split-tunnel network policies, this is a finding.

Fix: F-62245r930475_fix

In the ICS Web UI, navigate to Users >> Resource Policies >> Split Tunneling Networks. 1. If there are any split-tunnel network policies configured, select all of them and delete them. 2. If the split tunneling policies are needed for debugging or testing only, ensure the role being applied is only for the debugging or test group.

b
The ICS that provides a Simple Network Management Protocol (SNMP) Network Management System (NMS) must configure SNMPv3 to use FIPS-validated AES cipher block algorithm.
IA-3 - Medium - CCI-001967 - V-258597 - SV-258597r930479_rule
RMF Control
IA-3
Severity
Medium
CCI
CCI-001967
Version
IVCS-VN-000440
Vuln IDs
  • V-258597
Rule IDs
  • SV-258597r930479_rule
Without device-to-device authentication, communications with malicious devices may be established. Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are of greater risk. SNMPv3 supports authentication, authorization, access control, and privacy, while previous versions of the protocol contained well-known security weaknesses, which were easily exploited. SNMPv3 can be configured for identification and bidirectional, cryptographically based authentication. A typical SNMP implementation includes three components: managed device, SNMP agent, and NMS. The SNMP agent is the SNMP process that resides on the managed device and communicates with the network management system. The NMS is a combination of hardware and software that is used to monitor and administer a network. The SNMP data is stored in a highly structured, hierarchical format known as a management information base (MIB). The SNMP manager collects information about network connectivity, activity, and events by polling managed devices. SNMPv3 defines a user-based security model (USM), and a view-based access control model (VACM). SNMPv3 USM provides data integrity, data origin authentication, message replay protection, and protection against disclosure of the message payload. SNMPv3 VACM provides access control to determine whether a specific type of access (read or write) to the management information is allowed. Implement both VACM and USM for full protection. SNMPv3 server services must not be configured on products whose primary purpose is not to provide SNMP services. SNMP client services may be configured on the VPN gateway, application, or operating system to allow limited monitoring or querying of the device from by an SNMP server for management purposes. SNMP of any version will not be used to make configuration changes to the device. SNMPv3 must be disabled by default and enabled only if used. SNMP v3 provides security feature enhancements to SNMP, including encryption and message authentication. Currently, the AES cipher block algorithm can be used for both applying cryptographic protection (e.g., encryption) and removing or verifying the protection that was previously applied (e.g., decryption) in DOD. The use of FIPS-approved algorithms for both cryptographic mechanisms is required. If any version of SNMP is used for remote administration, default SNMP community strings such as "public" and "private" should be removed before real community strings are put into place. If the defaults are not removed, an attacker could retrieve real community strings from the device using the default string.
Checks: C-62337r930477_chk

In the ICS Web UI, navigate to System &gt;&gt; Log/Monitoring &gt;&gt; SNMP. Under "User 1", if a user configuration in AuthPriv is not using at least SHA and CFB-AES-128, this is a finding.

Fix: F-62246r930478_fix

Only the relevant portion of the SNMP configuration is highlighted here. In the ICS Web UI, navigate to System >> Log/Monitoring >> SNMP. 1. Under "User 1", type in a valid username. Select "AuthPriv". The priv protocol must be set to at least CFB-AES-128. 2. Type in the priv password.