Nutanix Acropolis Application Server Security Technical Implementation Guide

Overview

VersionDateFinding Count (31)Downloads
V1R12026-02-24CAT I (High): 2CAT II (Medium): 29CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - All

Finding IDSeverityTitleDescription
V-279434
LOWMEDIUMHIGH
Nutanix AOS must use multifactor authentication for access to privileged and nonprivileged accounts by enabling common access card (CAC) authentication.Multifactor authentication (MFA) is defined as using two or more factors to achieve authentication. MFA creates a layered defense and makes it more di...
V-279435
LOWMEDIUMHIGH
Nutanix AOS must use multifactor authentication for local access to privileged accounts.Multifactor authentication creates a layered defense and makes it more difficult for an unauthorized person to access the application server. If one f...
V-279415
LOWMEDIUMHIGH
Nutanix AOS must limit the number of concurrent sessions to 10 for all accounts and/or account types.Application management includes the ability to control the number of sessions that use an application by all accounts and/or account types. Limiting t...
V-279416
LOWMEDIUMHIGH
Nutanix AOS must automatically terminate a user session after a maximum of 15 minutes for nonprivileged users.An attacker can take advantage of user sessions that are left open, thus bypassing the user authentication process. To thwart the vulnerability of op...
V-279418
LOWMEDIUMHIGH
Nutanix AOS must have TLS enabled.Remote management access is accomplished by leveraging common communication protocols and establishing a remote connection to the application server v...
V-279421
LOWMEDIUMHIGH
Nutanix AOS must configure role mapping.Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policies, role-based policies, a...
V-279422
LOWMEDIUMHIGH
Nutanix AOS server management interface must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system.Application servers are required to display the Standard Mandatory DOD Notice and Consent Banner before granting access to the system management inter...
V-279423
LOWMEDIUMHIGH
Nutanix AOS must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by nonrepudiation.Nonrepudiation of actions taken is required to maintain application integrity. Examples of actions include creating information, sending a message, ap...
V-279424
LOWMEDIUMHIGH
Nutanix AOS must off-load log records onto a different system or media from the system being logged.Information system logging capability is critical for accurate forensic analysis. Log record content that may be necessary to satisfy the requirement ...
V-279425
LOWMEDIUMHIGH
Nutanix Cluster Check (NCC) must be configured to provide alerts to the system administrator (SA) and information system security officer (ISSO), immediately when audit storage reaches 75 percent capacity.It is critical for the appropriate personnel to be aware if a system is at risk of failing to process logs. Log processing failures include software/h...
V-279426
LOWMEDIUMHIGH
Nutanix AOS must use internal system clocks to generate time stamps for log records.Without using an approved and synchronized time source on the systems, events cannot be accurately correlated and analyzed to determine what is transp...
V-279427
LOWMEDIUMHIGH
Nutanix AOS must be configured to protect the application server log files from unauthorized access.If log data is compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, i...
V-279430
LOWMEDIUMHIGH
Nutanix AOS must configure the Nutanix Cluster Check (NCC) to alert the information system security officer (ISSO)/information system security manager (ISSM) or designated personnel, at a minimum.NCC is a diagnostic framework designed to ensure the health and stability of Nutanix clusters. It consists of a collection of scripts and tools that p...
V-279431
LOWMEDIUMHIGH
Nutanix AOS must enforce access restrictions associated with changes to configuration and software libraries.When dealing with access restrictions pertaining to change control, it should be noted that any changes to the software, and/or application server con...
V-279433
LOWMEDIUMHIGH
Nutanix AOS must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).To ensure accountability and prevent unauthorized access, application server users must be uniquely identified and authenticated. This is typically ac...
V-279438
LOWMEDIUMHIGH
Nutanix AOS must authenticate users individually prior to using a group authenticator.To ensure individual accountability and prevent unauthorized access, application server users (and any processes acting on behalf of application serve...
V-279439
LOWMEDIUMHIGH
Nutanix AOS must use multifactor authentication (MFA) for access to privileged and nonprivileged accounts by enabling client authentication.Requiring a device separate from the system to which the user is attempting to gain access for one of the factors during MFA is to reduce the likeliho...
V-279440
LOWMEDIUMHIGH
Nutanix AOS must use encryption when using LDAP for authentication.Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. Application servers...
V-279441
LOWMEDIUMHIGH
Nutanix VMM must terminate UI network connections associated with a communications session at the end of the session for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.When the application server is using PKI authentication, a local revocation cache must be stored for instances when the revocation cannot be authentic...
V-279442
LOWMEDIUMHIGH
Nutanix AOS must perform RFC 5280-compliant certification path validation.A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path vali...
V-279443
LOWMEDIUMHIGH
Nutanix AOS must accept Federal Identity, Credential, and Access Management (FICAM)-approved third-party credentials.Access may be denied to legitimate users if FICAM-approved third-party credentials are not accepted. This requirement typically applies to organizati...
V-279444
LOWMEDIUMHIGH
Nutanix AOS must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Without conforming to FICAM-issued profiles, the information system may not be interoperable with FICAM-authentication protocols, such as SAML 2.0 and...
V-279445
LOWMEDIUMHIGH
Nutanix AOS must be configured to use DOD PKI-issued certificates.Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DOD syst...
V-279446
LOWMEDIUMHIGH
Nutanix AOS must protect the confidentiality and integrity of all information at rest.When data is written to digital media such as hard drives, mobile computers, external/removable hard drives, personal digital assistants, flash/thumb ...
V-279447
LOWMEDIUMHIGH
Nutanix AOS must employ cryptographic mechanisms to ensure confidentiality and integrity of all information at rest when stored offline.This control is intended to address the confidentiality and integrity of information at rest in nonmobile devices and covers user information and syst...
V-279448
LOWMEDIUMHIGH
Nutanix AOS must implement cryptographic mechanisms to prevent unauthorized access to data at rest.Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive, tape drive) within an appli...
V-279450
LOWMEDIUMHIGH
Nutanix AOS must configure Network Time Protocol (NTP).Time synchronization of system clocks is essential for the correct execution of many system services, including identification and authentication proc...
V-279451
LOWMEDIUMHIGH
Nutanix AOS must restrict error messages only to authorized users.If the application provides too much information in error logs and administrative messages to the screen, this could lead to compromise. The structure...
V-279464
LOWMEDIUMHIGH
Nutanix UI must initiate session logging upon startup.An attacker can compromise a web server during the startup process. If logging is not initiated until all the web server processes are started, key in...
V-279486
LOWMEDIUMHIGH
Nutanix VMM must separate user functionality (including user interface services) from VMM management functionality.VMM management functionality includes functions necessary for administration and requires privileged user access. Allowing nonprivileged users to acce...
V-279526
LOWMEDIUMHIGH
All guest VM network communications must be implemented using virtual network devices provisioned and serviced by the VMM.Mechanisms to detect and prevent unauthorized communication flow must be configured or provided as part of the VMM design. If information flow control...