STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Nutanix Acropolis Application Server Security Technical Implementation Guide

V-279440

CAT II (Medium)

Nutanix AOS must use encryption when using LDAP for authentication.

Rule ID

SV-279440r1191106_rule

STIG

Nutanix Acropolis Application Server Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000197

Discussion

Passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. Application servers have the capability to use LDAP directories for authentication. If LDAP connections are not protected during transmission, sensitive authentication credentials can be stolen. When the application server uses LDAP, the LDAP traffic must be encrypted.

Check Content

Confirm the Nutanix Envoy Reverse Proxy is set to use encryption when using LDAP.

1. Log in to Prism Element.
2. Click the gear icon in the upper-right corner.
3. Navigate to Authentication settings.
4. Verify an Active Directory or OpenLDAP server is on the directory list.

If an Active Directory or OpenLDAP servers are not using ports 636 or 3269, which are SSL encrypted, this is a finding.

Fix Text

Configure the Nutanix VM application server to use an Active Directory server to authenticate individual users.

1. Log in to Prism Element.
2. Click the gear icon in the upper-right corner.
3. Navigate to Authentication settings.
4. Add an Active Directory or OpenLDAP server to the directory list using SSL encrypted ports 636 or 3269.