Check: CXEN-RE-000030
Citrix XenDesktop 7.x Receiver STIG:
CXEN-RE-000030
(in version v1 r1)
Title
Citrix Receiver must implement DoD-approved encryption. (Cat I impact)
Discussion
Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection thereby providing a degree of confidentiality. The encryption strength of mechanism is selected based on the security categorization of the information. Satisfies: SRG-APP-000014, SRG-APP-000015, SRG-APP-000142, SRG-APP-000219, SRG-APP-000416, SRG-APP-000427, SRG-APP-000439, SRG-APP-000440, SRG-APP-000441, SRG-APP-000442, SRG-APP-000514
Check Content
Verify encryption has been enabled on devices running Citrix Receiver: Open the Citrix Receiver Group Policy Object administrative template by running gpedit.msc. 1. Launch the Citrix Receiver Group Policy Object administrative template using the Group Policy Management Console. 2. Under the Computer Configuration node, go to Administrative Templates >> Citrix Receiver >> Network routing and select the TLS and Compliance Mode Configuration policy. 3. Verify the policy is enabled. If the policy is not enabled, this is a finding. 4. Verify the following policy options are selected: - Verify "Require TLS for all connections" is selected. - From the Security Compliance Mode drop-down, verify "SP800-52" is selected. - Verify "Full access check and CRL required" is selected. - Verify "Enable FIPS: is selected. - From the Allow TLS Servers drop-down, verify the desired port number is entered. - Verify "TLS 1.2" is selected. - From the TLS cipher suite drop-down, verify "Select Government (GOV)" is selected. - From the Certificate Revocation Check Policy drop-down, select the policy required by your Organizational Security Policy. If any of the policy options noted above are not selected, this is a finding.
Fix Text
As an administrator, open the Citrix Receiver Group Policy Object administrative template by running gpedit.msc. Apply the policy on a domain OU containing User Devices running Windows Receiver. 1. Launch the Citrix Receiver Group Policy Object administrative template using the Group Policy Management Console. 2. Under the Computer Configuration node, go to Administrative Templates >> Citrix Receiver >> Network routing and select the TLS and Compliance Mode Configuration policy. 3. Select "Enabled" to enable secure connections and to encrypt communication on the server. Set the following options: - Select "Require TLS" for all connections to force Citrix Receiver for Windows to use TLS for all connections to published applications and desktops. - From the Security Compliance Mode drop-down, select the option: SP800-52 – Select SP800-52 for compliance with NIST SP 800-52. - Select Full access check and CRL required. 4. Enable FIPS - Select this option to enforce the use of FIPS-approved cryptography. You must also enable the Windows security option from the operating system group policy, System Cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing. Otherwise, Citrix Receiver for Windows might fail to connect to published applications and desktops. 5. From the Allow TLS Servers drop-down, select the port number. Ensure that Citrix Receiver connects only to a specified server by using a comma-separated list. Wildcards and port numbers can be specified. For example, *.citrix.com:4433 allows connections to any server whose common name ends with .citrix.com on port 4433. The issuer of the certificate asserts the accuracy of the information in a security certificate. If Citrix Receiver does not recognize and trust the issuer, the connection is rejected. 6. From the TLS version drop-down, select "TLS 1.2". 7. TLS cipher suite - Select "Government (GOV)" 8. From the Certificate Revocation Check Policy drop-down, select the policy required by the Organizational Security Policy.
Additional Identifiers
Rule ID: SV-96141r1_rule
Vulnerability ID: V-81427
Group Title: SRG-APP-000014
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000068 |
The information system implements cryptographic mechanisms to protect the confidentiality of remote access sessions. |
CCI-000382 |
The organization configures the information system to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services. |
CCI-001184 |
The information system protects the authenticity of communications sessions. |
CCI-001453 |
The information system implements cryptographic mechanisms to protect the integrity of remote access sessions. |
CCI-002418 |
The information system protects the confidentiality and/or integrity of transmitted information. |
CCI-002420 |
The information system maintains the confidentiality and/or integrity of information during preparation for transmission. |
CCI-002421 |
The information system implements cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by organization-defined alternative physical safeguards. |
CCI-002422 |
The information system maintains the confidentiality and/or integrity of information during reception. |
CCI-002450 |
The information system implements organization-defined cryptographic uses and type of cryptography required for each use in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. |
CCI-002470 |
The information system only allows the use of organization-defined certificate authorities for verification of the establishment of protected sessions. |
Controls
Number | Title |
---|---|
AC-17 (2) |
Protection Of Confidentiality / Integrity Using Encryption |
CM-7 |
Least Functionality |
SC-8 |
Transmission Confidentiality And Integrity |
SC-8 (1) |
Cryptographic Or Alternate Physical Protection |
SC-8 (2) |
Pre / Post Transmission Handling |
SC-13 |
Cryptographic Protection |
SC-23 |
Session Authenticity |
SC-23 (5) |
Allowed Certificate Authorities |