RHEL-09-672020 - RHEL 9 crypto policy must not be overridden.

Information

Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run on that operating system. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data.

Satisfies: SRG-OS-000396-GPOS-00176, SRG-OS-000393-GPOS-00173, SRG-OS-000394-GPOS-00174

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure RHEL 9 to FIPS crypto policy.

$ sudo ln -s /usr/share/crypto-policies/FIPS/<service>.txt /etc/crypto-policies/back-ends/<service>.conf

Replace <service> with every service that is not set to FIPS.

The system must be rebooted to make the changes to take effect.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_9_V2R2_STIG.zip

Item Details

Category: MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|MA-4(6), 800-53|SC-13, CAT|II, CCI|CCI-002450, CCI|CCI-002890, CCI|CCI-003123, Rule-ID|SV-258236r987791_rule, STIG-ID|RHEL-09-672020, Vuln-ID|V-258236

Plugin: Unix

Control ID: 3a8fc5e7157c8563a281ac876a2b10690710e0477018e5035f7971771a612c55