1.8 Ensure updates, patches, and additional security software are installed


Periodically patches are released for included software either due to security flaws or to include additional functionality.


Newer patches may contain security enhancements that would not be available through the latest full update. As a result, it is recommended that the latest software patches be used to take advantage of the latest functionality. As with any software installation, organizations need to determine if a given update meets their requirements and verify the compatibility and supportability of any additional software against the update revision that is selected.


Use your package manager to update all packages on the system according to site policy.
The following command will install all available security updates:

# yum update --security


Site policy may mandate a testing period before install onto production systems for available updates. The audit and remediation here only cover security updates. Non-security updates can be audited with and comparing against site policy:

# yum check-update

This Benchmark recommendation maps to:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide:

Version 2, Release: 3 Benchmark Date: 26 Apr 2019

Vul ID: V-71999

Rule ID: SV-86623r4_rule

STIG ID: RHEL-07-020260

Severity: CAT II

See Also


Item Details


References: 800-53|SI-2c., CSCv7|3.4, CSCv7|3.5

Plugin: Unix

Control ID: 1a45ad4c4cbfdca53b45b9b2103e237971c6db04953e3b48ce5b55940dbcf21a