Citrix XenDesktop 7.x Receiver Security Technical Implementation Guide
Overview
Version | Date | Finding Count (2) | Downloads | ||
1 | 2018-08-28 | CAT I (High): 1 | CAT II (Medium): 1 | CAT III (Low): 0 | Excel JSON XML |
Stig Description |
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Findings - All
Finding ID | Severity | Title | Description |
V-81427 | High | Citrix Receiver must implement DoD-approved encryption. | Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless.... |
V-81429 | Medium | Citrix Receiver must accept Personal Identity Verification (PIV) credentials. | The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use of the CAC to support identity management and personal authentication for systems covered under HSPD 12, as well as a primary component of layered protection for national security systems. Satisfies: SRG-APP-000391,... |