|
<Past |
Future> |
| 5.5.x |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
| 5.6.x |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
| 5.7.x |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
| 6.1.x |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
| 6.2.x |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
| 6.3.x |
Authorized w/ Constraints (DIVEST) [1, 3, 4] |
Authorized w/ Constraints (DIVEST) [1, 3, 4] |
Authorized w/ Constraints (DIVEST) [1, 3, 4] |
Authorized w/ Constraints (DIVEST) [1, 4, 5] |
Unauthorized, Conditions Required[b] [1, 4, 5] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
| 6.4.x |
Authorized w/ Constraints [1, 3, 4] |
Authorized w/ Constraints [1, 3, 4] |
Authorized w/ Constraints [1, 3, 4] |
Authorized w/ Constraints (DIVEST) [1, 4, 5] |
Unauthorized, Conditions Required[b] [1, 4, 5] |
Unauthorized, Conditions Required[b] [1, 4, 5] |
Unauthorized, Conditions Required[b] [1, 4, 5] |
Unauthorized, Conditions Required[b] [1, 4, 5] |
Unauthorized, Conditions Required[b] [1, 4, 5] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
Unauthorized, Conditions Required[a] |
| 25.x |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints (POA&M) |
Authorized w/ Constraints [1, 4, 5] |
Authorized w/ Constraints [1, 4, 5] |
Authorized w/ Constraints [1, 4, 5] |
Authorized w/ Constraints [1, 4, 5] |
Authorized w/ Constraints [1, 4, 5] |
Authorized w/ Constraints [1, 4, 5] |
Authorized w/ Constraints [1, 4, 5] |
Authorized w/ Constraints [1, 4, 5] |
Authorized w/ Constraints [1, 4, 5] |
| Note: |
At the time of writing, version 25.3.2 is the most current version, released 10/01/2025. |
| | | | [1] | Technology must remain patched and operated in accordance with Federal and Department security policies and guidelines in order to mitigate known and future security vulnerabilities. | | | [3] | The File Transfer Protocol (FTP) features of this software must not be used as the FTP protocol is unauthorized for use on the VA network. (For further information see: VA Policy Memo VAIQ 7615193 on unauthorized Use of File Transfer Protocol (FTP) and Telnet Services)
This technology requires using a Universal Service Bus (USB) technology to transfer data into the records. As such, proper precautions need to be taken to protect data.
Users must Divest the use of Bitmap Image File (BMP) with this technology.
Users must not utilize Tagged Image File Format (TIFF) Document Converter, as determined during the time of this writing, an unauthorized technology in the TRM. | | | [4] | The Federal Information Processing standards (FIPS) 140-2 certification status of this technology was not able to be verified. This technology will require a 3rd party FIPS 140-2 or 140-3 certified solution for any data containing PHI/PII or VA sensitive information, where applicable. More information regarding the Cryptographic Module Validation Program (CMVP) can be found on the NIST website. | | | [5] | The File Transfer Protocol (FTP) features of this software must not be used as the FTP protocol is unauthorized for use on the VA network. (For further information see: VA Policy Memo VAIQ 7615193 on Prohibited Use of File Transfer Protocol (FTP) and Telnet Services)
This technology requires using a Universal Service Bus (USB) technology to transfer data into the records. As such, proper precautions need to be taken to protect data.
Users must Divest the use of Bitmap Image File (BMP) with this technology.
Users must not utilize Tagged Image File Format (TIFF) Document Converter, as it, at the time of writing, requires a POA&M. |
|