Information
Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run on that operating system. Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data.
Satisfies: SRG-OS-000033-GPOS-00014, SRG-OS-000396-GPOS-00176, SRG-OS-000393-GPOS-00173, SRG-OS-000394-GPOS-00174
Solution
Configure RHEL 10 to use a FIPS 140-3-compliant systemwide cryptographic policy.
Set the systemwide crypto-policy to FIPS with the following command:
$ sudo update-crypto-policies --set FIPS
Setting system policy to FIPS
Note: Systemwide crypto-policies are applied on application startup. It is recommended to restart the system for the change of policies to fully take place.
Item Details
Category: ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION
References: 800-53|AC-17(2), 800-53|MA-4(6), 800-53|SC-13, CAT|I, CCI|CCI-000068, CCI|CCI-002450, CCI|CCI-002890, CCI|CCI-003123, Rule-ID|SV-281008r1195401_rule, STIG-ID|RHEL-10-300010, Vuln-ID|V-281008
Control ID: 860b9040e8a68639cc0c9b22c86789a4495b177659f9e497ce3bacf9fd5aec15