NixOS must be configured to use AppArmor.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-268173 | ANIX-00-001890 | SV-268173r1039407_rule | Medium |
| Description |
| Users' home directories/folders may contain information of a sensitive nature. Nonprivileged users should coordinate any sharing of information with a system administrator (SA) through shared resources. Satisfies: SRG-OS-000480-GPOS-00230, SRG-OS-000368-GPOS-00154 |
| STIG | Date |
| Anduril NixOS Security Technical Implementation Guide | 2024-10-25 |
Details
| Check Text (C-72097r1039405_chk) |
| Verify NixOS is configured to use AppArmor with the following command: $ sudo systemctl status apparmor.service apparmor.service - Load AppArmor policies Loaded: loaded (/etc/systemd/system/apparmor.service; enabled; present: enabled) Active: active (running) since Sat 2022-06-04 02:51:43 UTC; 13min ago If the "apparmor.service" is not enabled and active, this is a finding. |
| Fix Text (F-72000r1039406_fix) |
| Add the following Nix code to the NixOS Configuration, usually located in /etc/nixos/configuration.nix. security.apparmor.enable = true; Rebuild the NixOS configuration with the following command: $ sudo nixos-rebuild switch && reboot |