NixOS must be configured to use AppArmor.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-268173 | ANIX-00-001890 | SV-268173r1131154_rule | CCI-000366 | medium |
| Description | ||||
| Users' home directories/folders may contain information of a sensitive nature. Nonprivileged users should coordinate any sharing of information with a system administrator (SA) through shared resources. Satisfies: SRG-OS-000480-GPOS-00230, SRG-OS-000368-GPOS-00154 | ||||
| STIG | Date | |||
| Anduril NixOS Security Technical Implementation Guide | 2025-08-19 | |||
Details
Check Text (C-268173r1131154_chk)
Verify NixOS is configured to use AppArmor with the following command:
$ sudo systemctl status apparmor.service
apparmor.service - Load AppArmor policies
Loaded: loaded (/etc/systemd/system/apparmor.service; enabled; present: enabled)
Active: active (running) since Sat 2022-06-04 02:51:43 UTC; 13min ago
If the "apparmor.service" is not enabled and active, this is a finding.
Fix Text (F-72000r1131153_fix)
Configure NixOS to use AppArmor.
Add the following Nix code to the NixOS Configuration, usually located in /etc/nixos/configuration.nix or /etc/nixos/flake.nix:
security.apparmor.enable = true;
Rebuild and switch to the new NixOS configuration:
$ sudo nixos-rebuild switch
A reboot is required for the changes to take effect.