

The Implementer of this technology has the responsibility to ensure the version deployed is 508-compliant. This technology has not been assessed by the Section 508 Office. Prior to use of this technology, users should check with their supervisor, Information Security Officer (ISO), Facility Chief Information Officer (CIO), or local Office of Information and Technology (OI&T) representative to ensure that all actions are consistent with current VA policies and procedures prior to implementation. Users must ensure sensitive data is properly protected in compliance with all VA regulations.

Users must ensure their use of this technology/standard is consistent with VA policies and standards, including, but not limited to, VA Handbooks 61 VA Directives 6004, 6513, and 6517 and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS). It also includes a configuration item under Secure Shell (SSH) called Microsoft Crypto Application Programming Interface (CAPI). To differentiate between PuTTY and PuTTY-CAC, the putty.exe file is included as a part of PuTTY-CAC. PuTTY-CAC allows system owners to administer and manage network resources without being physically present at the device location. This is a modified version of PuTTY SC (Smart Card), which supports SmartCard authentication such as the Department of Defense Common Access Card (DoD CAC) and other x.509 certificates. PuTTY-CAC (Common Access Card) is a Windows terminal emulation technology that supports the Secure Shell (SSH) protocol to access remote systems. More information on the proper use of the TRM can be found on the Technologies must be operated and maintained in accordance with Federal and Department security and
