STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Anduril NixOS Security Technical Implementation Guide

V-268078

CAT II (Medium)

NixOS must enable the built-in firewall.

Rule ID

SV-268078r1130947_rule

STIG

Anduril NixOS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-002322, CCI-000382, CCI-002314, CCI-000366

Discussion

Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking place would not be immediately stopped. Operating system remote access functionality must have the capability to immediately disconnect current users remotely accessing the information system and/or disable further remote access. The speed of disconnect or disablement varies based on the criticality of mission's functions and the need to eliminate immediate or future remote access to organizational information systems. The remote access functionality (e.g., RDP) may implement features such as automatic disconnect (or user-initiated disconnect) in case of adverse information based on an indicator of compromise or attack. Satisfies: SRG-OS-000298-GPOS-00116, SRG-OS-000096-GPOS-00050, SRG-OS-000297-GPOS-00115, SRG-OS-000480-GPOS-00232

Check Content

Verify NixOS has the network firewall enabled with the following command:

$ sudo iptables -L | grep nixos-fw-log-refuse

nixos-fw-log-refuse  all  --  anywhere             anywhere

Verify the firewall panic tools are present:
$ which firewall-panic
/run/current-system/sw/bin/firewall-panic

$ which firewall-panic-off
/run/current-system/sw/bin/firewall-panic-off

If the "nixos-fw-log-refuse  all  --  anywhere  anywhere" firewall rule is not present and the firewall panic commands are not found, this is a finding.

Fix Text

Update the NixOS config, typically stored either in /etc/nixos/configuration.nix or /etc/nixos/flake.nix, to enforce firewall rules by adding the following configuration settings:

 networking.firewall.enable = true;

Rebuild and switch to the new NixOS configuration:
$ sudo nixos-rebuild switch