Vulnerability Discussion
Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run on that operating system. Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data.
Satisfies: SRG-OS-000396-GPOS-00176, SRG-OS-000393-GPOS-00173, SRG-OS-000394-GPOS-00174
Check
Verify that the RHEL 9 crypto-policies package is installed with the following command:
$ dnf list --installed crypto-policies
Example output:
crypto-policies.noarch 20240828-2.git626aa59.el9_5
If the crypto-policies package is not installed, this is a finding.
Fix
Install the crypto-policies package (if the package is not already installed) with the following command:
$ sudo dnf -y install crypto-policies