UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Nutanix AOS 5.20.x Application Security Technical Implementation Guide


Overview

Date Finding Count (23)
2024-06-18 CAT I (High): 6 CAT II (Med): 15 CAT III (Low): 2
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC I - Mission Critical Public)

Finding ID Severity Title
V-254099 High Nutanix AOS must implement cryptography mechanisms to protect the confidentiality and integrity of the remote access session.
V-254112 High Nutanix AOS must utilize encryption when using LDAP for authentication.
V-254113 High Nutanix AOS must perform RFC 5280-compliant certification path validation.
V-254114 High Nutanix AOS must use DoD- or CNSS-approved PKI Class 3 or Class 4 certificates.
V-254115 High Nutanix AOS must protect the confidentiality and integrity of all information at rest.
V-254119 High Nutanix AOS must be running an operating system release that is currently supported by the vendor.
V-254097 Medium Nutanix AOS must automatically terminate a user session after 15 minutes of inactivity.
V-254098 Medium Nutanix AOS must disable Remote Support Sessions.
V-254105 Medium Nutanix AOS must be configured to send Cluster Check alerts to the SA and ISSO.
V-254104 Medium Nutanix AOS must provide an immediate warning to the SA and ISSO, at a minimum, when allocated log record storage volume reaches 75 percent of maximum log record storage capacity.
V-254107 Medium Nutanix AOS must protect log information from any type of unauthorized access.
V-254101 Medium Nutanix AOS must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
V-254100 Medium Nutanix AOS role mapping must be configured to the lowest privilege level needed for user access.
V-254103 Medium Nutanix AOS must offload log records onto a syslog server.
V-254109 Medium Nutanix AOS must use an enterprise user management system to uniquely identify and authenticate users.
V-254108 Medium Nutanix AOS must enforce access restrictions associated with changes to application server configuration.
V-254110 Medium Nutanix AOS must use multifactor authentication for account access.
V-254111 Medium Nutanix AOS must accept Personal Identity Verification (PIV) credentials to access the management interface.
V-254116 Medium Nutanix AOS must restrict error messages only to authorized users.
V-254117 Medium Nutanix AOS must separate hosted application functionality from application server management functionality.
V-254118 Medium Nutanix AOS must configure network traffic segmentation when using Disaster Recovery Services.
V-254106 Low Nutanix AOS must be configured to synchronize internal information system clocks using redundant authoritative time sources.
V-254102 Low Nutanix AOS must display the standard Mandatory DoD Notice and Consent Banner before granting access to the system.