| Review the system documentation to determine whether the organization has defined the information at rest that is to be protected from modification, which must include, at a minimum, PII and classified information. |
If no information is identified as requiring such protection, this is not a finding.
Verify the operating system implements encryption to protect the confidentiality and integrity of information at rest.
If a disk or filesystem requires encryption, ask the system owner, DBA, and SA to demonstrate the use of filesystem and/or disk-level encryption. If this is required and is not found, this is a finding.
To check if full disk encryption is enabled, log in to RHEL as an Admin user and run the following commands:
Identify the partition that Redis Enterprise is located on.
# blkid /dev/[name of partition]
If the output shows TYPE="crypto_LUKS" then the partition is encrypted.
If encryption must be used and is not employed, this is a finding.