STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Nutanix Acropolis GPOS Security Technical Implementation Guide

V-279604

CAT I (High)

Nutanix OS must store only encrypted representations of passwords.

Rule ID

SV-279604r1192604_rule

STIG

Nutanix Acropolis GPOS Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-004062

Discussion

Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised.

Check Content

1. Verify Nutanix OS is configured to store encrypted representation of passwords and that the encryption meets required standards using the following command.

$ sudo grep -i encrypt /etc/login.defs
ENCRYPT_METHOD SHA512

If the /etc/login.defs file does not contain the required output, this is a finding.

2. Confirm that the interactive user account passwords are using a strong password hash using the following command.

$ sudo cut -d: -f2 /etc/shadow

$6$hMKOdbToveIPcp$ybbhyd/bY/.nbce5H1Qc8Ji7ECmTZvs50ASDFHSY9XEW/TkK7Xer5xUYp7AHYzrk815rkJecsCDIMIgYXBQ9C/

Password hashes "!" or "*" indicate inactive accounts not available for logon and are not evaluated. If any interactive user passwords do not begin with "$6$", this is a finding.

3. Check that a minimum number of hash rounds is configured using the following command.

$ sudo grep -iE "^SHA_CRYPT_" /etc/login.defs
SHA_CRYPT_MAX_ROUNDS 5000

If the value of "SHA_CRYPT_MAX_ROUNDS" is not set to 5000 or more, this is a finding.

Fix Text

Configure Nutanix OS to use complex password using the following command.

1. For AOS, enter the following command.

$ sudo salt-call state.sls security/CVM/pamCVM.sls

2. For Prism Central, enter the following command.

$ sudo salt-call state.sls security/PCVM/pamPCVM.sls

3. For Files, enter the following command.

$ sudo salt-call state.sls security/AFS/pamAFS.sls