Nutanix Acropolis GPOS Security Technical Implementation Guide

Overview

VersionDateFinding Count (106)Downloads
V1R12026-02-24CAT I (High): 15CAT II (Medium): 85CAT III (Low): 6
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC I - Mission Critical Sensitive

Finding IDSeverityTitleDescription
V-279527
LOWMEDIUMHIGH
Nutanix VMM must be configured to remove ypserv.It is detrimental for VMMs to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabiliti...
V-279529
LOWMEDIUMHIGH
Nutanix OS must set the value of "lock-after-time" to 890 seconds for remote access sessions.A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information syst...
V-279530
LOWMEDIUMHIGH
Nutanix OS must configure the ClientAliveInterval to "600" and ClientAliveCountMax to "1".Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that ...
V-279531
LOWMEDIUMHIGH
Nutanix OS must monitor SSH access.Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities...
V-279532
LOWMEDIUMHIGH
Nutanix OS must configure the firewall to control remote access methods.Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, i...
V-279539
LOWMEDIUMHIGH
Nutanix OS must automatically remove or disable temporary user accounts after 72 hours.If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To ...
V-279540
LOWMEDIUMHIGH
Nutanix OS must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected ac...
V-279541
LOWMEDIUMHIGH
Nutanix OS must audit all account change actions.Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomp...
V-279542
LOWMEDIUMHIGH
Nutanix VMM must encrypt the boot password for root.To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-approved PKIs, all DOD syst...
V-279543
LOWMEDIUMHIGH
Nutanix OS must enable kernel parameters to enforce Discretionary Access Control (DAC) on hardlinks.DAC is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the obj...
V-279544
LOWMEDIUMHIGH
Nutanix OS must enable kernel parameters to enforce discretionary access control on symlinks.Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should ...
V-279545
LOWMEDIUMHIGH
Nutanix OS must audit the execution of privileged functions.Misusing privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised...
V-279546
LOWMEDIUMHIGH
Nutanix OS must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att...
V-279547
LOWMEDIUMHIGH
Nutanix OS must display the Standard Mandatory DOD Notice and Consent Banner for SSH access.Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbi...
V-279549
LOWMEDIUMHIGH
Nutanix OS must provide audit record generation capability for DOD-defined auditable events for account changes.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-279550
LOWMEDIUMHIGH
Nutanix OS must configure /etc/audit/audit.rules to generate audit records for account access actions.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-279551
LOWMEDIUMHIGH
Nutanix OS must configure /etc/audit/audit.rules to generate audit records for account deletion actions.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-279552
LOWMEDIUMHIGH
Nutanix OS must provide audit record generation for successful and unsuccessful uses of the init_module and finit_module system calls.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-279553
LOWMEDIUMHIGH
Nutanix OS must provide audit record generation for successful and unsuccessful attempts to move, remove, or delete files and directories.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-279554
LOWMEDIUMHIGH
Nutanix OS must generate audit records when successful/unsuccessful attempts to access security objects occur.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-279555
LOWMEDIUMHIGH
Nutanix OS must provide audit record generation capability for all account actions.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-279556
LOWMEDIUMHIGH
Nutanix OS must provide audit record generation capability for DOD-defined auditable events for all kernel module load, unload, and restart actions.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-279557
LOWMEDIUMHIGH
Nutanix OS must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the ...
V-279558
LOWMEDIUMHIGH
Nutanix OS must generate audit records when successful/unsuccessful attempts to modify security objects and categories of information (e.g., classification levels) occur.Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlat...
V-279559
LOWMEDIUMHIGH
Nutanix OS must generate audit records when successful/unsuccessful logon attempts occur.Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlat...
V-279560
LOWMEDIUMHIGH
Nutanix OS must generate audit records for privileged activities or other system-level access.Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlat...
V-279561
LOWMEDIUMHIGH
The audit system must be configured to audit the loading and unloading of dynamic kernel modules.Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlat...
V-279562
LOWMEDIUMHIGH
Nutanix OS must generate audit records when concurrent logons to the same account occur from different sources.Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlat...
V-279563
LOWMEDIUMHIGH
Nutanix OS must generate audit records for all account creations, modifications, disabling, and termination events.Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlat...
V-279564
LOWMEDIUMHIGH
Nutanix OS must generate audit records for all kernel module load, unload, and restart actions, and also for all program initiations.Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlat...
V-279565
LOWMEDIUMHIGH
Nutanix OS must have the audit.x86_64 package installed.If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state...
V-279569
LOWMEDIUMHIGH
Nutanix OS must alert the information system security officer (ISSO) and system administrator (SA) (at a minimum) in the event of an audit processing failure.It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notificatio...
V-279570
LOWMEDIUMHIGH
Nutanix AHV must disable network management of the chrony daemon.It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessa...
V-279571
LOWMEDIUMHIGH
Nutanix AHV must disable the chrony daemon from acting like a server.It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessa...
V-279572
LOWMEDIUMHIGH
Nutanix AHV must disable the use or cramfs kernel module.It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessa...
V-279575
LOWMEDIUMHIGH
Nutanix OS must configure audit log permissions for 0600 or less.Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit informat...
V-279576
LOWMEDIUMHIGH
Nutanix OS must configure the audit log files to be owned by root.Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tool...
V-279578
LOWMEDIUMHIGH
Nutanix OS must prevent SSH from permitting Generic Security Service Application Program Interface (GSSAPI) authentication.Failure to provide logical access restrictions associated with changes to system configuration may have significant effects on the overall security of...
V-279579
LOWMEDIUMHIGH
Nutanix AHV must not be configured to allow Kerberos authentication.Failure to provide logical access restrictions associated with changes to system configuration may have significant effects on the overall security of...
V-279580
LOWMEDIUMHIGH
Nutanix OS must prevent using dictionary words for passwords.If the operating system allows the user to select passwords based on dictionary words, then this increases the chances of password compromise by incre...
V-279581
LOWMEDIUMHIGH
Nutanix OS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account....
V-279582
LOWMEDIUMHIGH
Nutanix OS must set the SCMA framework to check the baseline daily.Configuring the operating system to implement organizationwide security implementation guides and security checklists ensures compliance with federal ...
V-279583
LOWMEDIUMHIGH
Nutanix OS must define default permissions for all authenticated users so the user can only read and modify their own files.Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary access....
V-279585
LOWMEDIUMHIGH
Nutanix OS must limit the ability of nonprivileged users to grant other users direct access to the contents of their home directories/folders.Users' home directories/folders may contain information of a sensitive nature. Nonprivileged users should coordinate any sharing of information with a...
V-279586
LOWMEDIUMHIGH
Nutanix OS must enable an application firewall.Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Application firewalls limit which applications ...
V-279587
LOWMEDIUMHIGH
Nutanix OS must mount /dev/shm with secure options.Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may provide a capability that r...
V-279588
LOWMEDIUMHIGH
Nutanix OS must mount /tmp with secure options.Controlling program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may provide a capability that ...
V-279589
LOWMEDIUMHIGH
Nutanix OS must mount /var/log/audit with secure options.Controlling program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may provide a capability that ...
V-279590
LOWMEDIUMHIGH
Nutanix OS must mount /var/tmp with secure options.Controlling program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may provide a capability that ...
V-279591
LOWMEDIUMHIGH
Nutanix OS must mount /var/log with secure options.Controlling program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may provide a capability that ...
V-279592
LOWMEDIUMHIGH
Nutanix OS must have the fapolicyd.service installed and active.Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may provide a capability that r...
V-279593
LOWMEDIUMHIGH
Nutanix OS must be configured to remove rsh-server.It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessa...
V-279594
LOWMEDIUMHIGH
Nutanix OS must be configured to remove telnet-server.It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessa...
V-279595
LOWMEDIUMHIGH
Nutanix OS must be configured to remove abrt.It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessa...
V-279596
LOWMEDIUMHIGH
Nutanix OS must be configured to remove sendmail.It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessa...
V-279597
LOWMEDIUMHIGH
Nutanix OS must be configured to prohibit or restrict using functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.To prevent unauthorized device connection, unauthorized information transfer, or unauthorized tunneling (i.e., embedding of data types within data typ...
V-279598
LOWMEDIUMHIGH
Nutanix OS must require users to reauthenticate for privilege escalation.Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the c...
V-279599
LOWMEDIUMHIGH
Nutanix OS must require users to reauthenticate for privilege escalation.Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the c...
V-279600
LOWMEDIUMHIGH
Nutanix OS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and...
V-279601
LOWMEDIUMHIGH
Nutanix OS must not install autofs.service.Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Peripherals include, but are...
V-279602
LOWMEDIUMHIGH
Nutanix OS must disable the ability to use USB mass storage devices.Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Peripherals include, but are...
V-279603
LOWMEDIUMHIGH
Nutanix VMM must, for password-based authentication, verify that when users create or update passwords, the passwords are not found on the list of commonly used, expected, or compromised passwords.Password-based authentication applies to passwords regardless of whether they are used in single-factor or multifactor authentication. Long passwords ...
V-279605
LOWMEDIUMHIGH
Nutanix OS must enforce password complexity by requiring that at least one uppercase character be used.Using a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure ...
V-279606
LOWMEDIUMHIGH
Nutanix OS must enforce password complexity by requiring at least one lowercase character be used.Using a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure ...
V-279607
LOWMEDIUMHIGH
Nutanix OS must enforce password complexity by requiring that at least one numeric character be used.Using a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure ...
V-279608
LOWMEDIUMHIGH
Nutanix OS must require the change of at least 50 percent of the total number of characters when passwords are changed.If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by i...
V-279609
LOWMEDIUMHIGH
Operating systems must enforce 24 hours/1 day as the minimum password lifetime.Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If u...
V-279610
LOWMEDIUMHIGH
Operating systems must enforce a 60-day maximum password lifetime restriction.Any password, no matter how complex, can eventually be cracked; therefore, passwords need to be changed periodically. If the operating system does not...
V-279611
LOWMEDIUMHIGH
Nutanix OS must enforce a minimum 15-character password length.The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexit...
V-279612
LOWMEDIUMHIGH
Nutanix OS must enforce password complexity by requiring that at least one special character be used.Using a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure of...
V-279613
LOWMEDIUMHIGH
Nutanix OS must configure pam_uni.so module to use SHA-512 for authentication to a cryptographic module.Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore cannot be relied upon to provide con...
V-279614
LOWMEDIUMHIGH
Nutanix OS must audit all activities performed during nonlocal maintenance and diagnostic sessions.If events associated with nonlocal administrative access or diagnostic sessions are not logged, a major tool for assessing and investigating attacks w...
V-279622
LOWMEDIUMHIGH
Nutanix OS must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.A Trusted Platform Module (TPM) is an example of a hardware-protected data store that can be used to protect cryptographic keys....
V-279623
LOWMEDIUMHIGH
Nutanix OS must isolate security functions from nonsecurity functions.An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Sec...
V-279624
LOWMEDIUMHIGH
Operating systems must prevent unauthorized and unintended information transfer via shared system resources.Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the a...
V-279625
LOWMEDIUMHIGH
Nutanix OS must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service (DoS) attacks.DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m...
V-279626
LOWMEDIUMHIGH
Nutanix OS must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring the operating system is implementing rate-limiting measures on impacted network interfaces.DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m...
V-279628
LOWMEDIUMHIGH
Nutanix OS must install and use SSH for remote access.Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, a...
V-279629
LOWMEDIUMHIGH
Nutanix OS must restrict the message log access permissions to reveal error messages only to authorized users.Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational st...
V-279630
LOWMEDIUMHIGH
Nutanix OS must restrict the /var/log directory access permissions to reveal error messages only to authorized users.Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational st...
V-279631
LOWMEDIUMHIGH
Nutanix OS must implement nonexecutable data to protect its memory from unauthorized code execution.Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Secur...
V-279632
LOWMEDIUMHIGH
Nutanix OS must implement address space layout randomization to protect its memory from unauthorized code execution.Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations that are prohibited. Secur...
V-279633
LOWMEDIUMHIGH
Nutanix OS must remove all software components after updated versions have been installed.Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by advers...
V-279667
LOWMEDIUMHIGH
Nutanix AHV must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.Any operating system providing too much information in error messages risks compromising the data and security of the structure, and content of error ...
V-279685
LOWMEDIUMHIGH
Nutanix AHV must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring the operating system is implementing rate-limiting measures on impacted network interfaces.DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m...
V-279528
LOWMEDIUMHIGH
Nutanix OS must limit the number of concurrent sessions to 10 for all accounts and/or account types.Operating system management includes the ability to control the number of users and user sessions that utilize an operating system. Limiting the numbe...
V-279548
LOWMEDIUMHIGH
Nutanix OS must display the Standard Mandatory DOD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access.The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen ...
V-279566
LOWMEDIUMHIGH
Nutanix OS must allocate audit record storage capacity to store at least one week's worth of audit records, when audit records are not immediately sent to a central audit record storage facility.To ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems must be able to allocate audit reco...
V-279567
LOWMEDIUMHIGH
Nutanix OS must be configured to send audit records to a site-specific remote syslog server.Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Satisfies: SRG-OS-000342-GPOS-00133, SRG-OS-0004...
V-279568
LOWMEDIUMHIGH
Nutanix OS must immediately notify the system administrator (SA) and information system security officer (ISSO) (at a minimum) when allocated audit record storage volume reaches 75 percent of the repository maximum audit record storage capacity.If security personnel are not notified immediately when storage volume reaches 75 percent usage, they are unable to plan for audit record storage capa...
V-279573
LOWMEDIUMHIGH
Nutanix OS must configure redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DOD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).Nutanix OS must compare internal information system clocks at least every 24 hours with a server synchronized to one of the redundant USNO time server...
V-279533
LOWMEDIUMHIGH
Nutanix OS must implement DOD-approved encryption to protect the confidentiality of SSH sessions.Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote ...
V-279534
LOWMEDIUMHIGH
Nutanix OS must implement cryptography to protect the integrity of remote access sessions by using only HMACs employing FIPS 140-3-approved algorithms.Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access ...
V-279535
LOWMEDIUMHIGH
Nutanix OS must implement cryptography to protect the integrity of remote access session by setting the systemwide policy to use FIPS mode.Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access ...
V-279536
LOWMEDIUMHIGH
Nutanix OS must implement TLS to protect the integrity and confidentiality of remote access and nonlocal maintenance and diagnostic sessions.Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access ...
V-279537
LOWMEDIUMHIGH
Nutanix OS must implement cryptography to protect the integrity of remote access sessions.Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access ...
V-279538
LOWMEDIUMHIGH
Nutanix OS must implement cryptography to protect the integrity and confidentiality of remote access and nonlocal maintenance and diagnostic sessions.Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access ...
V-279574
LOWMEDIUMHIGH
Nutanix OS must use cryptographic mechanisms to protect the integrity of audit tools.Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit information. Audit informat...
V-279577
LOWMEDIUMHIGH
Nutanix OS must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.Changes to any software components can have significant effects on the overall security of the operating system. This requirement ensures the software...
V-279584
LOWMEDIUMHIGH
Nutanix OS must not allow an unattended or automatic logon to the system.Failure to restrict system access to authenticated users negatively impacts operating system security....
V-279604
LOWMEDIUMHIGH
Nutanix OS must store only encrypted representations of passwords.Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can ...
V-279619
LOWMEDIUMHIGH
Nutanix OS must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions.Privileged access contains control and configuration information and is particularly sensitive, so additional protections are necessary. This is maint...
V-279620
LOWMEDIUMHIGH
Nutanix OS must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the system. The act of managing s...
V-279621
LOWMEDIUMHIGH
Nutanix OS must protect the confidentiality and integrity of all information at rest.Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used fo...
V-279627
LOWMEDIUMHIGH
Nutanix OS must protect the confidentiality and integrity of communications with wireless peripherals.Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unprotected communications ca...
V-279686
LOWMEDIUMHIGH
Nutanix AHV must store only encrypted representations of passwords.Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can ...