Nutanix OS must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-279540NXAC-OS-000017SV-279540r1192387_ruleCCI-003627medium
Description
Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts will not notice if unauthorized access to their user account has been obtained. Operating systems must track periods of inactivity and disable application identifiers after 35 days of inactivity.
STIGDate
Nutanix Acropolis GPOS Security Technical Implementation Guide2026-02-24

Details

Check Text (C-279540r1192387_chk)

Verify Nutanix OS is configured to disable user accounts after the password expires using the following command. $ sudo grep -i inactive /etc/default/useradd INACTIVE=0 If the "INACTIVE" value is set to "-1", a value greater than "35", or is commented out, this is a finding.

Fix Text (F-83998r1192296_fix)

Configure Nutanix OS to use complex password. 1. For AOS, enter the following command. $ sudo salt-call state.sls security/CVM/pamCVM.sls 2. For Prism Central, enter the following command. $ sudo salt-call state.sls security/PCVM/pamPCVM.sls 3. For Files, enter the following command. $ sudo salt-call state.sls security/AFS/pamAFS.sls 4. For AHV AOS CVM, enter the following command. $ ncli cluster edit-hypervisor-security-params enable-high-strength-password=true