RHEL-09-214010 - RHEL 9 must ensure cryptographic verification of vendor software packages.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version


Cryptographic verification of vendor software packages ensures that all software packages are obtained from a valid source and protects against spoofing that could lead to installation of malware on the system. Red Hat cryptographically signs all software packages, which includes updates, with a GPG key to verify that they are valid.


Install Red Hat package-signing keys on the system and verify their fingerprints match vendor values.

Insert RHEL 9 installation disc or attach RHEL 9 installation image to the system. Mount the disc or image to make the contents accessible inside the system.

Assuming the mounted location is '/media/cdrom', use the following command to copy Red Hat GPG key file onto the system:

$ sudo cp /media/cdrom/RPM-GPG-KEY-redhat-release /etc/pki/rpm-gpg/

Import Red Hat GPG keys from key file into system keyring:

$ sudo rpm --import /etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release

Using the steps listed in the Check Text, confirm the newly imported keys show as installed on the system and verify their fingerprints match vendor values.

See Also


Item Details

References: CAT|II, CCI|CCI-001749, Rule-ID|SV-257819r925444_rule, STIG-ID|RHEL-09-214010, Vuln-ID|V-257819

Plugin: Unix

Control ID: ce739c7f08a00b4355292113da64df040099010d73dce8c8f372dfbca1151039