STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Red Hat Enterprise Linux 8 Security Technical Implementation Guide

V-279933

CAT I (High)

RHEL 8 must have the crypto-policies package installed.

Rule ID

SV-279933r1156352_rule

STIG

Red Hat Enterprise Linux 8 Security Technical Implementation Guide

Version

V2R7

CCIs

CCI-002450

Discussion

Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run on that operating system. Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. Satisfies: SRG-OS-000396-GPOS-00176, SRG-OS-000393-GPOS-00173, SRG-OS-000394-GPOS-00174

Check Content

Verify the RHEL 8 crypto-policies package is installed with the following command:

$ sudo dnf list --installed crypto-policies

Updating Subscription Management repositories.
Installed Packages
crypto-policies.noarch                     20230731-1.git3177e06.el8                      @rhel-8-for-x86_64-baseos-rpms

If the crypto-policies package is not installed, this is a finding.

Fix Text

Install the crypto-policies package (if the package is not already installed) with the following command:

$ sudo dnf -y install crypto-policies