RHEL 8 cryptographic policy must not be overridden.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-279932RHEL-08-010270SV-279932r1156349_ruleCCI-002450high
Description
Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run on that operating system. Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. Satisfies: SRG-OS-000396-GPOS-00176, SRG-OS-000393-GPOS-00173, SRG-OS-000394-GPOS-00174
STIGDate
Red Hat Enterprise Linux 8 Security Technical Implementation Guide2026-02-05

Details

Check Text (C-279932r1156349_chk)

Verify RHEL 8 cryptographic policies are not overridden. Verify the configured policy matches the generated policy with the following command: $ sudo update-crypto-policies --is-applied The configured policy is applied If the returned message does not match the above, this is a finding.

Fix Text (F-84397r1156348_fix)

Configure RHEL 8 to correctly implement the systemwide cryptographic policies by reinstalling the crypto-policies package contents. Reinstall crypto-policies with the following command: $ sudo dnf -y reinstall crypto-policies Set the crypto-policy to FIPS with the following command: $ sudo update-crypto-policies --set FIPS Setting system policy to FIPS Note: Systemwide crypto policies are applied on application startup. It is recommended to restart the system for the change of policies to fully take place.