STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Ivanti Sentry 9.x NDM Security Technical Implementation Guide

V-251003

CAT III (Low)

Sentry must enforce access restrictions associated with changes to the system components.

Rule ID

SV-251003r1028241_rule

STIG

Ivanti Sentry 9.x NDM Security Technical Implementation Guide

Version

V3R1

CCIs

CCI-000345CCI-000366

Discussion

Changes to the hardware or software components of the network device can have significant effects on the overall security of the network. Therefore, only qualified and authorized individuals should be allowed administrative access to the network device for implementing any changes or upgrades. This requirement applies to updates of the application files, configuration, ACLs, and policy filters.

Check Content

Verify that only authorized administrators have permissions for changes, deletions, and updates on the Sentry. 

1. Log in to System Manager.
2. Go to Security >> Local Users.
3. Verify no unauthorized users are listed.

If unauthorized users are listed, this is a finding.

Fix Text

Configure that only authorized administrators have permissions for changes, deletions, and updates on the Sentry. 

1. Log in to System Manager.
2. Go to Security >> identity Source >> Local Users. 
3. Click "Add" to add authorized users.
4. If unauthorized users are listed, click the check box next to the unauthorized user and click "Delete".