Vulnerability Discussion
Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run on that operating system. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data.
Satisfies: SRG-OS-000396-GPOS-00176, SRG-OS-000393-GPOS-00173, SRG-OS-000394-GPOS-00174
Check
Verify that the RHEL 9 cryptography policy has been configured correctly with the following commands:
$ sudo update-crypto-policies --show
FIPS
If the cryptography is not set to "FIPS" and is not applied, this is a finding.
$ sudo update-crypto-policies --check
The configured policy matches the generated policy
If the command does not return "The configured policy matches the generated policy", this is a finding.
Fix
Configure the operating system to implement FIPS mode with the following command
$ sudo fips-mode-setup --enable
Reboot the system for the changes to take effect.