Verify File Hashes with RPM
Ensure gpgcheck Enabled In Main yum Configuration
Ensure Red Hat GPG Key Installed
Ensure gpgcheck Enabled for Local Packages
Ensure gpgcheck Enabled for All yum Package Repositories
Ensure gpgcheck Enabled for Repository Metadata
Disable Kernel Image Loading
Ensure gpgcheck Enabled In Main dnf Configuration
Ensure gpgcheck Enabled for All dnf Package Repositories
Ensure Fedora GPG Key Installed
Ensure Oracle Linux GPG Key Installed
Ensure gpgcheck Enabled In Main zypper Configuration
Ensure gpgcheck Enabled for All zypper Package Repositories
Ensure SUSE GPG Key Installed
The application server must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
The application must have the capability to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
Docker Incs official GPG key must be added to the host using the users operating systems respective package repository management tooling.
The FortiGate device must only install patches or updates that are validated by the vendor via digital signature or hash.
Forescout must prevent the installation of patches, service packs, plug-ins, or modules without verification the update has been digitally signed using a certificate that is recognized and approved by the organization.
The DataPower Gateway must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
The Mainframe Product must prevent the installation of patches, service packs, or application components without verification that the software component has been digitally signed using a certificate that is recognized and approved by the organization.
Add-ins to Office applications must be signed by a Trusted Publisher.
Trust Bar Notifications for unsigned application add-ins must be blocked.
Trust Bar Notifications for unsigned application add-ins must be blocked.
Application add-ins must be signed by Trusted Publisher.
Add-ins to Office applications must be signed by a Trusted Publisher.
Exchange Local machine policy must require signed scripts.
The Exchange local machine policy must require signed scripts.
Disabling of Fully Trusted Solutions access to computers must be configured.
A form that is digitally signed must be displayed with a warning.
A form that is digitally signed must be displayed with a warning.
Users must be prevented from using or inserting apps that come from the Office Store.
Access to updates, add-ins, and patches on Office.com must be disabled.
Trust Bar Notifications for unsigned applications must be disabled.
The network device must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
Nutanix AOS must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients, which will ensure the authenticity of communications sessions when answering requests from the Tanium Server.
The Tanium Server must protect the confidentiality and integrity of transmitted information with cryptographic signing capabilities enabled to ensure the authenticity of communications sessions when making requests from Tanium Clients.
The Tanium Server must be configured to only allow signed content to be imported.
The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients to safeguard the authenticity of communications sessions when answering requests from the Tanium Server.
The Tanium cryptographic signing capabilities must be enabled on the Tanium Server.
The Tanium Server must be configured to allow only signed content to be imported.
The UEM server must prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
A private web server must subscribe to certificates, issued from any DoD-authorized Certificate Authority, as an access control mechanism for web users.
Expansion modules must be fully reviewed, tested, and signed before they can exist on a production Apache web server.
The macOS system must have the security assessment policy subsystem enabled.
The macOS system must apply gatekeeper settings to block applications from unidentified developers.
Advance package Tool (APT) must be configured to prevent the installation of patches, service packs, device drivers, or Ubuntu operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
The macOS system must enable Gatekeeper.
The Ubuntu operating system's Advance Package Tool (APT) must be configured to prevent the installation of patches, service packs, device drivers, or Ubuntu operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
The container platform must be built from verified packages.
The container platform must verify container images.
The operating system must prevent the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
Exchange local machine policy must require signed scripts.
Checking for signatures on downloaded programs must be enforced.
Trust Bar Notifications for unsigned application add-ins in Access must be disabled and blocked.
Trust Bar notifications must be configured to display information in the Message Bar about the content that has been automatically blocked.
Trust Bar notification must be enabled for unsigned application add-ins in Excel and blocked.
Project must automatically disable unsigned add-ins without informing users.
Unsigned add-ins in PowerPoint must be blocked with no Trust Bar Notification to the user.
Publisher must automatically disable unsigned add-ins without informing users.
Publisher must disable all unsigned VBA macros.
Visio must automatically disable unsigned add-ins without informing users.
Word must automatically disable unsigned add-ins without informing users.
The Oracle Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.
The Oracle Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
The Oracle Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
The Oracle Linux operating system must ensure cryptographic verification of vendor software packages.
YUM must be configured to prevent the installation of patches, service packs, device drivers, or OL 8 system components that have not been digitally signed using a certificate that is recognized and approved by the organization.
OL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
OL 8 must prevent the loading of a new kernel for later execution.
OL 8 must ensure cryptographic verification of vendor software packages.
OpenShift must verify container images.
RHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
RHEL 8 must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
RHEL 8 must prevent the loading of a new kernel for later execution.
All Automation Controller NGINX front-end web server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.
Expansion modules must be fully reviewed, tested, and signed before they can exist on a production Automation Controller NGINX front-end web server.
The Red Hat Enterprise Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components from a repository without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
The Red Hat Enterprise Linux operating system must prevent the installation of software, patches, service packs, device drivers, or operating system components of local packages without verification they have been digitally signed using a certificate that is issued by a Certificate Authority (CA) that is recognized and approved by the organization.
The Red Hat Enterprise Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.
The Red Hat Enterprise Linux operating system must ensure cryptographic verification of vendor software packages.
RHEL 8 must ensure cryptographic verification of vendor software packages.
RHEL 9 must prevent the loading of a new kernel for later execution.
RHEL 9 must ensure cryptographic verification of vendor software packages.
RHEL 9 must check the GPG signature of software packages originating from external software repositories before installation.
RHEL 9 must check the GPG signature of locally installed software packages before installation.
RHEL 9 must have GPG signature verification enabled for all software repositories.
RHEL 9 subscription-manager package must be installed.
The SUSE operating system tool zypper must have gpgcheck enabled.
The SUSE operating system tool zypper must have gpgcheck enabled.
The system must verify that package updates are digitally signed.
The VMM must prevent the installation of guest VMs, patches, service packs, device drivers, or VMM components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
The ESXi Image Profile and vSphere Installation Bundle (VIB) acceptance levels must be verified.
VAMI server binaries and libraries must be verified for their integrity.
Performance Charts application files must be verified for their integrity.
Performance Charts must only run one webapp.
ESX Agent Manager application files must be verified for their integrity.
ESX Agent Manager must only run one webapp.
Lookup Service application files must be verified for their integrity.
Lookup Service must only run one webapp.
The ESXi Image Profile and vSphere Installation Bundle (VIB) acceptance level must be verified.
The Photon operating system RPM package management tool must cryptographically verify the authenticity of all software packages during installation.
The Photon operating system RPM package management tool must cryptographically verify the authenticity of all software packages during installation.
The Photon operating system YUM repository must cryptographically verify the authenticity of all software packages during installation.
The Security Token Service application files must be verified for their integrity.
The Security Token Service must only run one webapp.
vSphere UI application files must be verified for their integrity.
vSphere UI plugins must be authorized before use.
The Photon operating system TDNF package management tool must cryptographically verify the authenticity of all software packages during installation.
The Photon operating system TDNF package management tool must cryptographically verify the authenticity of all software packages during installation for all repos.
All web server files must be verified for their integrity (e.g., checksums and hashes) before becoming part of the production web server.
Expansion modules must be fully reviewed, tested, and signed before they can exist on a production web server.
Ubuntu 22.04 LTS must be configured so that the Advance Package Tool (APT) prevents the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
The F5 BIG-IP appliance must be configured to prevent the installation of patches, service packs, or application components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
MKE must only run signed images.
Rancher RKE2 must be built from verified packages.
The SLEM 5 tool zypper must have gpgcheck enabled.