STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Nutanix Acropolis GPOS Security Technical Implementation Guide

V-279592

CAT II (Medium)

Nutanix OS must have the fapolicyd.service installed and active.

Rule ID

SV-279592r1192602_rule

STIG

Nutanix Acropolis GPOS Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001764

Discussion

Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may provide a capability that runs counter to the mission or provides users with functionality that exceeds mission requirements. This includes functions and services installed at the operating system level. Some of the programs, installed by default, may be harmful or may not be necessary to support essential organizational operations (e.g., key missions, functions). Removal of executable programs is not always possible; therefore, establishing a method of preventing program execution is critical to maintaining a secure system baseline. Methods for complying with this requirement include restricting execution of programs in certain environments, while preventing execution in other environments; or limiting execution of certain program functionality based on organization-defined criteria (e.g., privileges, subnets, sandboxed environments, or roles).

Check Content

Verify in Nutanix OS that fapolicyd is installed and active using the following command.

$ sudo yum list installed fapolicyd
Installed Packages
fapolicyd.x86_64   

$ sudo systemctl status fapolicyd.service
fapolicyd.service - File Access Policy Daemon
Loaded: loaded (/usr/lib/systemd/system/fapolicyd.service; enabled; vendor preset: disabled)
Active: active (running)

If fapolicyd is not installed and active, this is a finding.

Fix Text

1. For AOS, configure fapolicyd.service using the following command.

$ sudo salt-call state.sls security/CVM/fapolicydCVM.sls

2. For Prism Central, configure fapolicyd.service using the following command.

$ sudo salt-call state.sls security/PCVM/fapolicydPCVM.sls

3. For Files, configure fapolicyd.service using the following command.

$ sudo salt-call state.sls security/AFS/fapolicydAFS.sls

4. Configure AHV to restrict the use of SSH using the following command.

$ sudo salt-call state.sls security/KVM/iptables/init