|
<Past |
Future> |
| 1.2018.x |
Unapproved |
Unapproved |
Unapproved |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
| 1.2020.x |
Unapproved |
Unapproved |
Unapproved |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
| 1.2021.x |
Unapproved |
Unapproved |
Unapproved |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
| 1.2022.x |
DIVEST [2, 9, 11, 12, 13, 14] |
DIVEST [2, 9, 11, 12, 13, 14] |
Unapproved |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
| 1.2023.x |
Approved w/Constraints [2, 9, 11, 12, 13, 14] |
Approved w/Constraints [2, 9, 11, 12, 13, 14] |
Approved w/Constraints [2, 9, 11, 12, 13, 14] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 15, 16] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 15, 16] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 15, 16] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
| 1.2024.x |
Unapproved |
Unapproved |
Unapproved |
Authorized w/ Constraints [2, 11, 12, 13, 14, 15, 16] |
Authorized w/ Constraints [2, 11, 12, 13, 14, 15, 16] |
Authorized w/ Constraints [2, 11, 12, 13, 14, 15, 16] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints (DIVEST) [2, 11, 12, 13, 14, 16, 17] |
| 1.2025.x |
Unapproved |
Unapproved |
Unapproved |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints [2, 11, 12, 13, 14, 16, 17] |
Authorized w/ Constraints [2, 11, 12, 13, 14, 16, 17] |
| Note: |
At the time of writing, version 1.2025.7.71 is the most current version and was released 05/30/2025. |
| | | | [2] | Technology must remain patched and operated in accordance with Federal and Department security policies and guidelines in order to mitigate known and future security vulnerabilities. | | | [9] | Users must not utilize the Secure Sockets Layer (SSL) protocol, as it is unapproved for use on the TRM. | | | [11] | Users should check with their supervisor, Information System Security Officer (ISSO) or local OIT representative for permission to download and use this software. Downloaded software must always be scanned for viruses prior to installation to prevent adware or malware. Freeware may only be downloaded directly from the primary site that the creator of the software has advertised for public download and user or development community engagement. Users should note, any attempt by the installation process to install any additional, unrelated software is not authorized and the user should take the proper steps to decline those installations. | | | [12] | In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004 , VA Directive 6517, and VA Directive 6513. The local ISSO (Information System Security Officer) can advise on the ESCCB review process. | | | [13] | This technology should only be used when required by a Veterans Affairs (VA) business partner for an authorized VA Project. Use of this technology must comply with ESCCB requirements which include: Signed Interconnection Agreements/Memorandum of Understanding agreements (MOU/ISA) with each external business partner, compliance with VA Handbook 6500, and must implement appropriate National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS) requirements for all devices interacting with this technology. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with VA Handbook 6500 and National Institute of Standards and Technology (NIST) standards. As of January 27th, 2017, Risk-based Decisions (RBD) will be handled per VAIQ # 7769667. In cases where the technology is used for external connections, a full Enterprise Security Change Control Board (ESCCB) review is required in accordance VA Directive 6004, VA Directive 6517
and VA Directive 6513. The local ISSO can advise on the ESCCB review process and ensure privacy of information compliance protections are in place. | | | [14] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with both VA Handbook 6500 and VA Directive 6500. | | | [15] | Users must not utilize the Secure Sockets Layer (SSL) protocol, as it requires a POA&M. | | | [16] | The Federal Information Processing standards (FIPS) 140-2 certification status of this technology was not able to be verified. This technology will require a 3rd party FIPS 140-2 or 140-3 certified solution for any data containing PHI/PII or VA sensitive information, where applicable. More information regarding the Cryptographic Module Validation Program (CMVP) can be found on the NIST website. | | | [17] | Users must not utilize the Secure Sockets Layer (SSL) protocol, as it requires a POA&M.
Per the Security Assessment Review, users must abide by the following constraints:
- A vulnerability exists because XrmToolBox v1.x supports third-party plugins/tools, many authored by community developers without formal security vetting. To mitigate, restrict to approved plugin/tool sources and enforce code signing where possible.
- A vulnerability exists because XrmToolBox v1.x connects to and makes use of multiple cloud-based services. To mitigate, the ISSO shall educate and prohibit users from using the integrated cloud service capability until the VA Cloud Security Requirements have been met and the affected A&A package has been appropriately updated.
- A vulnerability exists because XrmToolBox v1.x collects anonymous statistics. To mitigate, administrators shall restrict this feature. A registry key can be created to block the execution of the data collection.
- A vulnerability exists because XrmToolBox v1.x installs an outdated (v5.3.0.0) NuGet package Microsoft.IdentityModel.Clients.ActiveDirectory. This package has
been deprecated as it is legacy and is no longer maintained. To mitigate, users must work with the vendor to have this package replaced with one that is fully supported. See the NuGet Package Listing for this package for suggested alternatives and migration instructions.
- A vulnerability exists because XrmToolBox v1.x installs an outdated (v6.1.7601.24479) Microsoft.Identity extension for .Net. According to the Project’s website IdentityModel 6.x is deprecated and support ended May 2024. To mitigate, users must work with the vendor to validate this vulnerability. If it is valid, the extension must be upgraded to a supported version following the recommendations on the project’s website.
- A vulnerability exists because XrmToolBox v1.x provides automatic/user configurable checks for updates. To mitigate, it is recommended that the administrator disable
automatic update checking from the application.
- A vulnerability exists because XrmToolBox v1.x is Open-Source Software (OSS). To mitigate, adequate maintenance and support must be provided for OSS. The Sponsor/Software admin personnel shall maintain and monitor the distribution of XrmToolBox v1.x.
|
|