Version | Date | Finding Count (2) | ||
---|---|---|---|---|
1 | 2018-08-28 | CAT I (High): 1 | CAT II (Med): 1 | CAT III (Low): 0 |
STIG Description |
---|
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Finding ID | Severity | Title | Description |
---|---|---|---|
V-81427 | High | Citrix Receiver must implement DoD-approved encryption. | Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information... |
V-81429 | Medium | Citrix Receiver must accept Personal Identity Verification (PIV) credentials. | The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use of the CAC to support identity management and personal authentication... |