DISA STIGS Viewer

NixOS must enable the built-in firewall.

Overview

Finding ID Version Rule ID IA Controls Severity
V-268078 ANIX-00-000010 SV-268078r1039122_rule   Medium
Description
Without the ability to immediately disconnect or disable remote access, an attack or other compromise taking place would not be immediately stopped. Operating system remote access functionality must have the capability to immediately disconnect current users remotely accessing the information system and/or disable further remote access. The speed of disconnect or disablement varies based on the criticality of mission's functions and the need to eliminate immediate or future remote access to organizational information systems. The remote access functionality (e.g., RDP) may implement features such as automatic disconnect (or user-initiated disconnect) in case of adverse information based on an indicator of compromise or attack. Satisfies: SRG-OS-000298-GPOS-00116, SRG-OS-000096-GPOS-00050, SRG-OS-000297-GPOS-00115, SRG-OS-000480-GPOS-00232
STIG Date
Anduril NixOS Security Technical Implementation Guide 2024-10-25

Details

Check Text (C-72002r1039120_chk)
Verify NixOS has the network firewall enabled with the following command:

$ grep firewall.enable /etc/nixos/configuration.nix

networking.firewall.enable = true;

If "networking.firewall.enable" is not set to "true", is commented out, or is missing, this is a finding.
Fix Text (F-71905r1039121_fix)
Configure /etc/nixos/configuration.nix to enforce firewall rules by adding the following configuration settings:

networking.firewall.enable = true;

Rebuild the system with the following command:

$ sudo nixos-rebuild switch