<Past |
Future> |
2011 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2012 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2014R1.1 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2014R2.7 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
5R1.0 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
5.2.x |
Approved w/Constraints [6, 7, 8] |
Divest [6, 8, 9, 10] |
Divest [6, 8, 9, 10] |
Divest [6, 8, 10, 11] |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
5.3.x |
Unapproved |
Divest [6, 8, 9, 10] |
Divest [6, 8, 9, 10] |
Divest [6, 8, 10, 11] |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
5.4.x |
Unapproved |
Approved w/Constraints [6, 8, 9, 10] |
Approved w/Constraints [6, 8, 9, 10] |
Divest [6, 8, 10, 11] |
Divest [6, 8, 10, 11] |
Divest [6, 8, 10, 11] |
Divest [6, 8, 12, 13, 14] |
Divest [6, 8, 12, 13, 14] |
Divest [6, 8, 12, 13, 14] |
Unapproved |
Unapproved |
Unapproved |
5.5.x |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [6, 8, 10, 11] |
Approved w/Constraints [6, 8, 10, 11] |
Approved w/Constraints [6, 8, 10, 11] |
Divest [6, 8, 12, 13, 14] |
Divest [6, 8, 12, 13, 14] |
Divest [6, 8, 12, 13, 14] |
Divest [6, 8, 12, 13, 14] |
Divest [6, 8, 12, 13, 14] |
Divest [6, 8, 13, 14, 15] |
5.6.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [6, 8, 12, 13, 14] |
Approved w/Constraints [6, 8, 12, 13, 14] |
Approved w/Constraints [6, 8, 12, 13, 14] |
Approved w/Constraints [6, 8, 12, 13, 14] |
Approved w/Constraints [6, 8, 12, 13, 14] |
Divest [6, 8, 13, 14, 15] |
5.7.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Divest [6, 8, 13, 14, 15] |
5.8.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
2024R1 |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
| | [1] | Product must remain patched and its configuration hardened with approved VA guidelines in order to mitigate known and future vulnerabilities. Extensive testing also highly recommended before deployment to end users. See reference tab for additional product specific security best practices. | | [2] | As of April 23, 2015, per the Deputy CIO of Architecture, Strategy and Design (ASD), all technologies in use by the VA require an assessment by the VA Section 508 office. Section 508 of the Rehabilitation Act Amendments of 1998 is a federal law that sets the guidelines for technology accessibility. A VA Section 508 assessment of this technology has not been completed at the time of publication. Therefore, as of April 23, 2015 only users of this technology who have deployed the technology to the production environment, or have project design and implementation plans approved, may continue to operate this technology. In the case of a project that has implemented, or been approved for a specific site or number of users, and that project needs to expand operations to other sites or to an increased user base, it may do so as long as the project stays on the existing version of the technology that was approved or implemented as of April 22, 2015. Use of this technology in all other cases is prohibited.
| | [3] | Users must ensure they are using Nagios XI 2012R2.4 or later to mitigate security vulnerabilities.
This technology depends on MySQL which may only be used for Intranet applications and my not be used with PII/PHI/VA Sensitive information as of this writing. See the MySQL TRM entry for more information. | | [4] | Per the May 5th, 2015 memorandum from the VA Chief Information Security Officer (CISO) FIPS 140-2 Validate Full Disk Encryption (FOE) for Data at Rest in Database Management Systems (DBMS) and in accordance with Federal requirements and VA policy, database management must use Federal Information Processing Standards (FIPS) 140-2 compliant encryption to protect the confidentiality and integrity of VA information at rest at the application level. If FIPS 140-2 encryption at the application level is not technically possible, FIPS 140-2 compliant full disk encryption (FOE) must be implemented on the hard drive where the DBMS resides. Appropriate access enforcement and physical security control must also be implemented. All instances of deployment using this technology should be reviewed to ensure compliance with VA Handbook 6500 and National Institute of Standards and Technology (NIST) standards. It is the responsibility of the system owner to work with the local CIO (or designee) and Information Security Officer (ISO) to ensure that a compliant DBMS technology is selected and that if needed, mitigating controls are in place and documented in a System Security Plan (SSP). | | [5] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [6] | Due to National Institute of Standards and Technology (NIST) identified security vulnerabilities, extra vigilance should be applied to ensure the versions remain properly patched to mitigate known and future vulnerabilities. The local ISO can provide assistance in reviewing the NIST vulnerabilities. | | [7] | Users must ensure they are using Nagios XI 2014R1.1 or later to mitigate security vulnerabilities.
This technology depends on MySQL which may only be used for Intranet applications and cannot be used with PII/PHI/VA Sensitive information as of this writing. See the MySQL TRM entry for more information. | | [8] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [9] | Users must ensure they are using Nagios XI 2014R1.1 or later to mitigate security vulnerabilities.
This product can be configured with a MySQL Database which currently has TRM constraints for intranet use only due to its many known security issues. If MySQL is selected for use with this product, these factors must be considered especially when an instance of this product will be considered a Moderate or High Risk system. See the MySQL Database TRM entry for more details.
Use of this product to store Protected Heath Information (PHI), Personally Identifiable Information (PII) or VA-sensitive information is unapproved until VA develops and approves a security configuration baseline to meet VA`s security requirements for PHI/PII/VA-sensitive information. See the VA baseline website site referenced above for more information. Any use of this product for PHI/PII/VA-sensitive information must be waivered for use through the waiver process. At the time of this writing, NIST and NSOC had not made a distinction if any known vulnerabilities have been remediated in the enterprise edition. This will need to be considered if VA were to develop a security configuration baseline for either edition.
Users must not utilize MariaDB with this product.
All systems must be patched/hardened with approved VA guidelines along with extensive testing in a closed network environment before it can be connected to the VA network due to the vulnerabilities and known issues. In addition, server links must be monitored to ensure confidentiality, integrity, availability. | | [10] | Technology must remain patched and operated in accordance with Federal and Department security policies and guidelines in order to mitigate known and future security vulnerabilities. | | [11] | Users must ensure they are using Nagios XI 2014R1.1 or later to mitigate security vulnerabilities.
This product can be configured with a MySQL Database which currently has TRM constraints for intranet use only due to its many known security issues. If MySQL is selected for use with this product, these factors must be considered especially when an instance of this product will be considered a Moderate or High Risk system. See the MySQL Database TRM entry for more details.
Use of this product to store Protected Heath Information (PHI), Personally Identifiable Information (PII) or VA-sensitive information is unapproved until VA develops and approves a security configuration baseline to meet VA`s security requirements for PHI/PII/VA-sensitive information. See the VA baseline website site referenced above for more information. Any use of this product for PHI/PII/VA-sensitive information must be waivered for use through the waiver process. At the time of this writing, NIST and NSOC had not made a distinction if any known vulnerabilities have been remediated in the enterprise edition. This will need to be considered if VA were to develop a security configuration baseline for either edition.
Users must not utilize MariaDB with this product.
All systems must be patched/hardened with approved VA guidelines along with extensive testing in a closed network environment before it can be connected to the VA network due to the vulnerabilities and known issues. In addition, server links must be monitored to ensure confidentiality, integrity, availability. | | [12] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
Users must ensure they are using Nagios XI 2014R1.1 or later to mitigate security vulnerabilities.
This product can be configured with a MySQL Database, which at the time of writing has TRM constraints for intranet use only due to its many known security issues. If MySQL is selected for use with this product, these factors should be considered especially when an instance of this product will be considered a Moderate or High Risk system. Please refer to MySQL Database TRM entry for more details.
Use of this product to store Protected Heath Information (PHI), Personally Identifiable Information (PII) or VA-sensitive information is unapproved until VA develops and approves a security configuration baseline to meet VA`s security requirements for PHI/PII/VA-sensitive information. See the VA baseline website site referenced above for more information. Any use of this product for PHI/PII/VA-sensitive information must be waivered for use through the waiver process. At the time of this writing, NIST and NSOC had not made a distinction if any known vulnerabilities have been remediated in the enterprise edition. This will need to be considered if VA were to develop a security configuration baseline for either edition.
Users must not utilize MariaDB with this product.
All systems must be patched/hardened with approved VA guidelines along with extensive testing in a closed network environment before it can be connected to the VA network due to the vulnerabilities and known issues. In addition, server links must be monitored to ensure confidentiality, integrity, availability. | | [13] | Users should check with their supervisor, Information Security Office (ISO) or local OIT representative for permission to download and use this software. Downloaded software must always be scanned for viruses prior to installation to prevent adware or malware. Freeware may only be downloaded directly from the primary site that the creator of the software has advertised for public download and user or development community engagement. Users should note, any attempt by the installation process to install any additional, unrelated software is not approved and the user should take the proper steps to decline those installations. | | [14] | Per the May 5th, 2015 memorandum from the VA Chief Information Security Officer (CISO) FIPS 140-2 Validate Full Disk Encryption (FOE) for Data at Rest in Database Management Systems (DBMS) and in accordance with Federal requirements and VA policy, database management must use Federal Information Processing Standards (FIPS) 140-2 compliant encryption to protect the confidentiality and integrity of VA information at rest at the application level. If FIPS 140-2 encryption at the application level is not technically possible, FIPS 140-2 compliant full disk encryption (FOE) must be implemented on the hard drive where the DBMS resides. Appropriate access enforcement and physical security control must also be implemented. All instances of deployment using this technology should be reviewed to ensure compliance with VA Handbook 6500 and National Institute of Standards and Technology (NIST) standards. It is the responsibility of the system owner to work with the local CIO (or designee) and Information Security Officer (ISO) to ensure that a compliant DBMS technology is selected and that if needed, mitigating controls are in place and documented in a System Security Plan (SSP). | | [15] | Users must ensure that PostgreSQL is implemented with VA-approved baselines. (refer to the ‘Category’ tab under ‘Runtime Dependencies’)
If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
Users must ensure they are using Nagios XI 2014R1.1 or later to mitigate security vulnerabilities.
This product can be configured with a MySQL Database, which at the time of writing has TRM constraints for intranet use only due to its many known security issues. If MySQL is selected for use with this product, these factors should be considered especially when an instance of this product will be considered a Moderate or High Risk system. Please refer to MySQL Database TRM entry for more details.
Use of this product to store Protected Heath Information (PHI), Personally Identifiable Information (PII) or VA-sensitive information is unapproved until VA develops and approves a security configuration baseline to meet VA`s security requirements for PHI/PII/VA-sensitive information. See the VA baseline website site referenced above for more information. Any use of this product for PHI/PII/VA-sensitive information must be waivered for use through the waiver process. At the time of this writing, NIST and NSOC had not made a distinction if any known vulnerabilities have been remediated in the enterprise edition. This will need to be considered if VA were to develop a security configuration baseline for either edition.
Users must not utilize MariaDB with this product.
All systems must be patched/hardened with approved VA guidelines along with extensive testing in a closed network environment before it can be connected to the VA network due to the vulnerabilities and known issues. In addition, server links must be monitored to ensure confidentiality, integrity, availability. |
|
Note: |
Note: The vendor changed the versioning format in 2023. At the time of writing, the most current version is 2024R1, released 12/06/2023. |