3.0 |
Authorized w/ Constraints [1, 2, 3, 4] |
Authorized w/ Constraints [1, 2, 3, 4] |
Authorized w/ Constraints [1, 2, 3, 4] |
Authorized w/ Constraints [1, 2, 3, 4] |
Authorized w/ Constraints [1, 2, 3, 4] |
Authorized w/ Constraints [1, 2, 3, 4] |
Authorized w/ Constraints [1, 2, 3, 4] |
Authorized w/ Constraints [1, 2, 3, 4] |
Authorized w/ Constraints [1, 2, 3, 4] |
Authorized w/ Constraints [1, 2, 3, 4] |
Authorized w/ Constraints [1, 2, 3, 4] |
Authorized w/ Constraints [1, 2, 3, 4] |
| | [1] | If free trialware is utilized, the software must be purchased or removed at the end of the trial period.
Per the Security Assessment Review, users must abide by the following constraints:
- A vulnerability exists because the IDMaker Software is not FIPS 140-2, (or its
successor) certified. To mitigate, due to potential information security risks
with processing badge requests with the solution, it is recommended that
information is secured using a VA approved encryption platform to protect
potentially vulnerable data.
- A vulnerability exists because IDMaker Software installs multiple open-source
components for software functionality. To mitigate third-party/open-source
components incorporated into IDMaker Software, the vendor must maintain
all components during the entire product lifecycle, including responding to
vulnerabilities discovered in third-party components used in the product.
- A vulnerability exists because IDMaker includes an unsupported version of
Microsoft C++ 2005 Library (Version 8.00.50727.6195). Microsoft no longer
provides maintenance and security support for the product. To mitigate,
administrators must ensure that installed versions of Microsoft® C Runtime
Libraries are updated to a TRM approved version of the software. The vendor
must maintain all third-party components during the entire product lifecycle,
including responding to vulnerabilities discovered in third-party components
used in the product.
- A vulnerability exists because IDMaker installs an outdated version of libcurl
shared library (7.29.0) which has multiple published vulnerabilities and is listed
as Authorized w/ Constraints (POA&M) on the VA TRM. To mitigate, system
administrators shall use the latest version of the product where possible and
monitor both the Common Vulnerabilities and Exposures (CVE) Details and
NIST National Vulnerability Database (NVD) websites for any new security
vulnerabilities.
- A vulnerability exists because IDMaker installs an outdated version of
OpenSSL Shared Library (1.0.1e) which has multiple published vulnerabilities
and is listed as Authorized w/ Constraints (POA&M) on the VA TRM. To
mitigate, system administrators shall use the latest version of the product
where possible and monitor both the CVE Details and NIST NVD websites for
any new security vulnerabilities.
- A vulnerability exists because IDMaker installs a version of Portable Network
Graphics (PNG) image compression library (1.5.2) which has multiple
published vulnerabilities. To mitigate, system administrators shall use the
latest version of the product where possible and monitor both the CVE Details
and NIST NVD websites for any new security vulnerabilities.
- A vulnerability exists because IDMaker installs an outdated version of zlib data
compression library (1.2.5) which has multiple published vulnerabilities and is
listed as Authorized w/ Constraints (POA&M) on the VA TRM. To mitigate,
system administrators shall use the latest version of the product where
possible and monitor both the CVE Details and NIST NVD websites for any
new security vulnerabilities.
- A vulnerability exists because IDMaker installs a version of Windows Driver
Files (WDF) Coinstaller (1.9.7600.16385) which has a published vulnerability.
To mitigate, system administrators shall use the latest version of the product
where possible and monitor both the CVE Details and NIST NVD websites for
any new security vulnerabilities.
| | [2] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with both VA Handbook 6500 and VA Directive 6500. | | [3] | Users should check with their supervisor, Information System Security Officer (ISSO) or local OIT representative for permission to download and use this software. Downloaded software must always be scanned for viruses prior to installation to prevent adware or malware. Freeware may only be downloaded directly from the primary site that the creator of the software has advertised for public download and user or development community engagement. Users should note, any attempt by the installation process to install any additional, unrelated software is not authorized and the user should take the proper steps to decline those installations. | | [4] | The Federal Information Processing standards (FIPS) 140-2 certification status of this technology was not able to be verified. This technology will require a 3rd party FIPS 140-2 or 140-3 certified solution for any data containing PHI/PII or VA sensitive information, where applicable. More information regarding the Cryptographic Module Validation Program (CMVP) can be found on the NIST website. |
|