ALMA-09-009590 |
V1R1 |
AlmaLinux OS 9 must check the GPG signature of software packages originating from external software repositories before installation. |
|
ALMA-09-009700 |
V1R1 |
AlmaLinux OS 9 must ensure cryptographic verification of vendor software packages. |
|
ALMA-09-009810 |
V1R1 |
AlmaLinux OS 9 must check the GPG signature of locally installed software packages before installation. |
|
ALMA-09-009920 |
V1R1 |
AlmaLinux OS 9 must check the GPG signature of repository metadata before package installation. |
|
ALMA-09-010030 |
V1R1 |
AlmaLinux OS 9 must have GPG signature verification enabled for all software repositories. |
|
ALMA-09-010140 |
V1R1 |
AlmaLinux OS 9 must prevent the loading of a new kernel for later execution. |
|
APPL-14-002060 |
V2R2 |
The macOS system must apply gatekeeper settings to block applications from unidentified developers. |
|
APPL-14-002064 |
V2R2 |
The macOS system must enable Gatekeeper. |
|
OL07-00-020050 |
V3R1 |
The Oracle Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization. |
|
OL07-00-020060 |
V3R1 |
The Oracle Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization. |
|
OL07-00-010019 |
V3R1 |
The Oracle Linux operating system must ensure cryptographic verification of vendor software packages. |
|
OL08-00-010370 |
V2R2 |
YUM must be configured to prevent the installation of patches, service packs, device drivers, or OL 8 system components that have not been digitally signed using a certificate that is recognized and approved by the organization. |
|
OL08-00-010371 |
V2R2 |
OL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization. |
|
OL08-00-010372 |
V2R2 |
OL 8 must prevent the loading of a new kernel for later execution. |
|
OL08-00-010019 |
V2R2 |
OL 8 must ensure cryptographic verification of vendor software packages. |
|
RHEL-07-020050 |
V3R9 |
The Red Hat Enterprise Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization. |
|
RHEL-07-020060 |
V3R9 |
The Red Hat Enterprise Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization. |
|
RHEL-08-010370 |
V2R1 |
RHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization. |
|
RHEL-08-010371 |
V2R1 |
RHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization. |
|
RHEL-08-010372 |
V2R1 |
RHEL 8 must prevent the loading of a new kernel for later execution. |
|
RHEL-08-010019 |
V2R1 |
RHEL 8 must ensure cryptographic verification of vendor software packages. |
|
RHEL-09-214010 |
V2R2 |
RHEL 9 must ensure cryptographic verification of vendor software packages. |
|
RHEL-09-214015 |
V2R2 |
RHEL 9 must check the GPG signature of software packages originating from external software repositories before installation. |
|
RHEL-09-214020 |
V2R2 |
RHEL 9 must check the GPG signature of locally installed software packages before installation. |
|
RHEL-09-214025 |
V2R2 |
RHEL 9 must have GPG signature verification enabled for all software repositories. |
|
RHEL-09-215010 |
V2R2 |
RHEL 9 subscription-manager package must be installed. |
|
SLES-12-010550 |
V3R1 |
The SUSE operating system tool zypper must have gpgcheck enabled. |
|
SLES-15-010430 |
V2R2 |
The SUSE operating system tool zypper must have gpgcheck enabled. |
|
UBTU-18-010016 |
V2R15 |
Advance package Tool (APT) must be configured to prevent the installation of patches, service packs, device drivers, or Ubuntu operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization. |
|
UBTU-20-010438 |
V2R1 |
The Ubuntu operating system's Advance Package Tool (APT) must be configured to prevent the installation of patches, service packs, device drivers, or Ubuntu operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization. |
|
UBTU-22-214010 |
V2R2 |
Ubuntu 22.04 LTS must be configured so that the Advance Package Tool (APT) prevents the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization. |
|