1.2.1 Ensure package manager repositories are properly configured

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Systems need to have package manager repositories properly configured to ensure they receive the latest patches and updates.

Rationale:

If a system's package manager repositories are misconfigured, important patches may not be identified, or a rogue repository could introduce compromised software.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure your package manager repositories according to your vendor.
As an alternative, package manager repositories from nginx.org are available for a variety of Linux platforms.

See Also

https://workbench.cisecurity.org/files/4212