NixOS must be configured to use AppArmor.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
medium | V-268173 | SRG-OS-000480-GPOS-00230 | ANIX-00-001890 | SV-268173r1039407_rule | 2024-10-25 | 1 |
Description |
---|
Users' home directories/folders may contain information of a sensitive nature. Nonprivileged users should coordinate any sharing of information with a system administrator (SA) through shared resources. Satisfies: SRG-OS-000480-GPOS-00230, SRG-OS-000368-GPOS-00154 |
ℹ️ Check |
---|
Verify NixOS is configured to use AppArmor with the following command: $ sudo systemctl status apparmor.service apparmor.service - Load AppArmor policies Loaded: loaded (/etc/systemd/system/apparmor.service; enabled; present: enabled) Active: active (running) since Sat 2022-06-04 02:51:43 UTC; 13min ago If the "apparmor.service" is not enabled and active, this is a finding. |
✔️ Fix |
---|
Add the following Nix code to the NixOS Configuration, usually located in /etc/nixos/configuration.nix. security.apparmor.enable = true; Rebuild the NixOS configuration with the following command: $ sudo nixos-rebuild switch && reboot |