STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Nutanix Acropolis Application Server Security Technical Implementation Guide

V-279451

CAT II (Medium)

Nutanix AOS must restrict error messages only to authorized users.

Rule ID

SV-279451r1192368_rule

STIG

Nutanix Acropolis Application Server Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001314

Discussion

If the application provides too much information in error logs and administrative messages to the screen, this could lead to compromise. The structure and content of error messages need to be carefully considered by the organization and development team. The extent to which the information system is able to identify and handle error conditions is guided by organizational policy and operational requirements. Application servers must protect the error messages that are created by the application server. All application server users' accounts are used for the management of the server and the applications residing on the application server. All accounts are assigned to a certain role with corresponding access rights. The application server must restrict access to error messages so only authorized users may view them. Error messages are usually written to logs contained on the file system. The application server will usually create new log files as needed and must take steps to ensure the proper file permissions are used when the log files are created.

Check Content

Nutanix VM application server supports user and group role mapping. Verify that all users or groups match that of the documented mapping policies defined by the information system security officer (ISSO).

1. Log in to Prism Element.
2. Click the gear icon in the upper-right corner.
3. Navigate to "Role mapping".

For each user or group listed, verify the role granted is in accordance with access control policies. If not, this is a finding.

Fix Text

Configure the user and group mappings to be compliant with the documented mapping policies defined by the ISSO.

1. Log in to Prism Element.
2. Click the gear icon in the upper-right corner.
3. Navigate to "Role mapping".
4. Add users and groups to role mappings per policy.