<Past |
Future> |
1.x |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 4] |
Approved w/Constraints [2, 4] |
Approved w/Constraints [2, 4] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
2.x |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 4] |
Approved w/Constraints [2, 4] |
Approved w/Constraints [2, 4] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
3.x |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 3] |
Approved w/Constraints [2, 4] |
Approved w/Constraints [2, 4] |
Approved w/Constraints [2, 4] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
Approved w/Constraints [2, 5] |
| | [1] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [2] | Technology must remain patched and operated in accordance with Federal and Department security policies and guidelines in order to mitigate known and future security vulnerabilities. | | [3] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [4] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with VA Handbook 6500. | | [5] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with both VA Handbook 6500 and VA Directive 6500. |
|
Note: |
At the time of writing, version 3.02.0002 is the most current version. |