STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Nutanix Acropolis Application Server Security Technical Implementation Guide

V-279445

CAT II (Medium)

Nutanix AOS must be configured to use DOD PKI-issued certificates.

Rule ID

SV-279445r1192540_rule

STIG

Nutanix Acropolis Application Server Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-002470CCI-002450

Discussion

Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DOD systems or by organizations with insufficient security controls. If the CA used for verifying the certificate is not a DOD-approved CA, trust of this CA has not been established. The DOD will only accept PKI certificates obtained from a DOD-approved internal or external certificate authority. Reliance on CAs for the establishment of secure sessions includes using SSL/TLS certificates. The application server must only allow using DOD PKI-established certificate authorities for verification. Satisfies: SRG-APP-000427-AS-000264, SRG-APP-000514-AS-000137

Check Content

Confirm the Nutanix VM application server is configured with a trusted DOD root CA-signed certificate.

1. Log in to Prism Element.
2. Click the gear icon in the upper-right corner.
3. Navigate to the SSL Certificate section.
4. Ensure the approved CA signed certificate is installed.

If the certificate used is not from an approved DOD-approved CA, this is a finding.

Fix Text

Configure the Nutanix VM application server to use a trusted DOD root CA-signed certificate.

1. Log in to Prism Element.
2. Click the gear icon in the upper-right corner.
3. Navigate to the SSL Certificate section.
4. Click "Relace Certificate".
5. Select "Import Key and Certificate".
6. Select the Private Key Type and upload the private key, public certificate, and the CA certificate or chain.
7. Select "Import Files".