Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-246824 | HYCU-AC-000006 | SV-246824r768136_rule | Medium |
Description |
---|
A mechanism to detect and prevent unauthorized communication flow must be configured or provided as part of the system design. If management information flow is not enforced based on approved authorizations, the network device may become compromised. Information flow control regulates where management information is allowed to travel within a network device. The flow of all management information must be monitored and controlled so it does not introduce any unacceptable risk to the network device or data. |
STIG | Date |
---|---|
HYCU for Nutanix Security Technical Implementation Guide | 2021-08-03 |
Check Text ( C-50256r768134_chk ) |
---|
By default, HYCU firewall is locked and enabled. The firewall only permits DHCP, SMB, and access to the web UI port 8443. Verify the firewall is running by executing the following command: sudo firewall-cmd --state If service is not running, this is a finding. Determine which services and ports are open by executing the following command: sudo firewall-cmd --list-all Output should show the following two lines: 'services: cockpit dhcpv6-client iscsi-target samba ssh' 'ports: 8443/tcp' If more services than those listed above are open, this is a finding. |
Fix Text (F-50210r768135_fix) |
---|
Enable the firewall by executing the following commands: sudo systemctl enable firewalld sudo systemctl start firewalld |