Skip to content

Nutanix AOS role mapping must be configured to the lowest privilege level needed for user access.

An XCCDF Rule

Description

<VulnDiscussion>Strong access controls are critical to securing the application server. Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) must be employed by the application server to control access between users (or processes acting on behalf of users) and objects (e.g., applications, files, records, processes, application domains) in the application server. Without stringent logical access and authorization controls, an adversary may have the ability, with very little effort, to compromise the application server and associated supporting infrastructure.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-254100r846388_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

Configure the user and group mappings to be compliant with the documented mapping policies defined by the ISSO.

1. Log in to Prism Element.
2. Click on the gear icon in the upper right.
3. Navigate to "role mapping".
4. Add users and groups to role mappings per policy.