Citrix Virtual Apps and Desktop 7.x StoreFront Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-275970 High The version of Virtual Apps and Desktop Storefront running on the system must be a supported version.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- CVAD-SF-000030
- Vuln IDs
-
- V-234251
- Rule IDs
-
- SV-234251r960759_rule
Checks: C-37436r612113_chk
A DoD approved VPN, or gateway/proxy, must be leveraged to access StoreFront from a remote network. This VPN, or gateway, must handle user authentication and tunneling of StoreFront traffic. The VPN, or gateway, must meet the DoD encryption requirements, such as FIPS 140-2, for the environment. If no VPN, or gateway/proxy, is used for remote access to StoreFront, this is a finding. If the VPN, or gateway/proxy, does not authenticate the remote user before providing access to StoreFront, this is a finding. If the VPN, or gateway/proxy, fails to meet the DoD encryption requirements for the environment, this is a finding.
Fix: F-37401r612114_fix
Implement a DoD approved VPN, or gateway/proxy, that will authenticate user access and tunnel/proxy traffic to StoreFront. Ensure the VPN, or gateway/proxy, is configured to authenticate the user before accessing the environment, and meets the DoD encryption requirements, such as FIPS 140-2, for the environment.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- CVAD-SF-000855
- Vuln IDs
-
- V-234252
- Rule IDs
-
- SV-234252r961494_rule
Checks: C-37437r612116_chk
Open the Citrix StoreFront management console and select the "Store" node in the left pane. For each Store listed, select the store and perform the following: 1) From the Actions menu item, click "Manage Authentication Methods". 2) Ensure only "Smart card" is selected. If using remote access "Pass-through from NetScaler Gateway" may also be selected. If the "Smart Card" method is not selected, or if other methods are selected, this is a finding. If "Pass-through from NetScaler Gateway" is selected, this is not a finding.
Fix: F-37402r612117_fix
Open the Citrix StoreFront management console and select the "Store" node in the left pane. For each Store listed, select the store and perform the following: 1) From the Actions menu item, click "Manage Authentication Methods". 2) Check "Smart card" and uncheck any other authentication methods. If using remote access, select "Pass-through from NetScaler Gateway".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- CVAD-SF-999999
- Vuln IDs
-
- V-275970
- Rule IDs
-
- SV-275970r1115777_rule
Checks: C-80088r1111767_chk
Virtual Apps and Desktop Storefront 7.x is no longer supported by the vendor. If the system is running Virtual Apps and Desktop Storefront 7.x, this is a finding.
Fix: F-79993r1111768_fix
Upgrade to a supported version.