ALMA-09-040060 - AlmaLinux OS 9 must implement a FIPS 140-3-compliant systemwide cryptographic policy.

Information

Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run on that operating system. Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data.

Satisfies: SRG-OS-000396-GPOS-00176, SRG-OS-000393-GPOS-00173, SRG-OS-000394-GPOS-00174

Solution

Configure AlmaLinux OS 9 to use a FIPS 140-3-compliant systemwide cryptographic policy.

Create a subpolicy for enhancements to the base systemwide crypto-policy by creating the file /etc/crypto-policies/policies/modules/STIG.pmod with the following content:

# Define ciphers and MACs for OpenSSH and libssh
cipher@SSH=AES-256-GCM AES-256-CTR AES-128-GCM AES-128-CTR
mac@SSH=HMAC-SHA2-512 HMAC-SHA2-256

Apply the policy enhancements to the FIPS systemwide cryptographic policy level with the following command:

$ sudo update-crypto-policies --set FIPS:STIG

Note: If additional subpolicies are being employed, they should be added to the update-crypto-policies command.

To make the cryptographic settings effective for already running services and applications, restart the system:

$ sudo reboot

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CL_AlmaLinux_OS_9_V1R3_STIG.zip

Item Details

Category: MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|MA-4(6), 800-53|SC-13, CAT|II, CCI|CCI-002450, CCI|CCI-003123, Rule-ID|SV-269418r1107628_rule, STIG-ID|ALMA-09-040060, Vuln-ID|V-269418

Plugin: Unix

Control ID: 5007c1c42961b5a634bae4052fb7386303b357666c512db8dcfb69b05e512d5c