STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Nutanix Acropolis GPOS Security Technical Implementation Guide

V-279602

CAT II (Medium)

Nutanix OS must disable the ability to use USB mass storage devices.

Rule ID

SV-279602r1192485_rule

STIG

Nutanix Acropolis GPOS Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000778

Discussion

Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Peripherals include, but are not limited to, flash drives, external storage, and printers.

Check Content

Verify Nutanix OS is set to disable the ability to use USB mass storage devices using the following command.

$ sudo grep -i usb-storage /etc/modprobe.d/stig-reqs.conf 
install usb-storage /bin/false

$ sudo grep -i usb-storage /etc/modprobe.d/blacklist.conf 
blacklist usb-storage

If the command does not return any output or the output is not "blacklist usb-storage", and use of USB storage devices is not documented with the information system security officer (ISSO) as an operational requirement, this is a finding.

Fix Text

1. For AOS, disable USB mass storage and blacklist from executing using the following command.

$ sudo salt-call state.sls security/CVM/modprobeCVM

2. For Prism Central, disable USB mass storage and blacklist from executing using the following command.

$ sudo salt-call state.sls security/PCVM/modprobePCVM

3. For Files, disable USB mass storage and blacklist from executing using the following command.

$ sudo salt-call state.sls security/AFS/modprobeAFS

4. Configure AHV to disable USB mass storage and blacklist from executing using the following command.

$ sudo salt-call state.sls security/KVM/modprobeKVM