NixOS must be configured to use AppArmor.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-268173 | ANIX-00-001890 | SV-268173r1039407_rule | CCI-000366 | medium |
| Description | ||||
| Users' home directories/folders may contain information of a sensitive nature. Nonprivileged users should coordinate any sharing of information with a system administrator (SA) through shared resources. Satisfies: SRG-OS-000480-GPOS-00230, SRG-OS-000368-GPOS-00154 | ||||
| STIG | Date | |||
| Anduril NixOS Security Technical Implementation Guide | 2024-10-25 | |||
Details
Check Text (C-268173r1039407_chk)
Verify NixOS is configured to use AppArmor with the following command:
$ sudo systemctl status apparmor.service
apparmor.service - Load AppArmor policies
Loaded: loaded (/etc/systemd/system/apparmor.service; enabled; present: enabled)
Active: active (running) since Sat 2022-06-04 02:51:43 UTC; 13min ago
If the "apparmor.service" is not enabled and active, this is a finding.
Fix Text (F-72000r1039406_fix)
Add the following Nix code to the NixOS Configuration, usually located in /etc/nixos/configuration.nix.
security.apparmor.enable = true;
Rebuild the NixOS configuration with the following command:
$ sudo nixos-rebuild switch && reboot