Capacity
SC-12(3)
Choose one
19
Rule
Severity: High
The Installed Operating System Is FIPS 140-2 Certified
1
Rule
Severity: High
Ensure that FIPS mode is enabled on all cluster nodes
14
Rule
Severity: High
Configure BIND to use System Crypto Policy
17
Rule
Severity: High
Configure System Cryptography Policy
14
Rule
Severity: High
Configure Kerberos to use System Crypto Policy
16
Rule
Severity: High
Configure Libreswan to use System Crypto Policy
16
Rule
Severity: Medium
Configure OpenSSL library to use System Crypto Policy
5
Rule
Severity: Medium
Install the dracut-fips-aesni Package
5
Rule
Severity: Medium
Install the dracut-fips Package
13
Rule
Severity: High
Ensure '/etc/system-fips' exists
5
Rule
Severity: High
Enable FIPS Mode in GRUB2
12
Rule
Severity: Medium
Harden SSHD Crypto Policy
14
Rule
Severity: High
Ensure gpgcheck Enabled In Main yum Configuration
13
Rule
Severity: High
Ensure Red Hat GPG Key Installed
10
Rule
Severity: High
Ensure gpgcheck Enabled for All yum Package Repositories
8
Rule
Severity: High
Ensure gpgcheck Enabled for Repository Metadata
10
Rule
Severity: Medium
Enable the fips_mode SELinux Boolean
11
Rule
Severity: Medium
Use Only FIPS 140-2 Validated Ciphers
11
Rule
Severity: Medium
Use Only FIPS 140-2 Validated MACs
7
Rule
Severity: Medium
Configure SSSD LDAP Backend Client CA Certificate
7
Rule
Severity: Medium
Configure SSSD LDAP Backend Client CA Certificate Location
7
Rule
Severity: Medium
Configure SSSD LDAP Backend Client to Demand a Valid Certificate from the Server
9
Rule
Severity: High
Enable Dracut FIPS Module
9
Rule
Severity: High
Enable FIPS Mode
9
Rule
Severity: High
Set kernel parameter 'crypto.fips_enabled' to 1
5
Rule
Severity: High
Ensure gpgcheck Enabled In Main dnf Configuration
4
Rule
Severity: High
Ensure gpgcheck Enabled for All dnf Package Repositories
1
Rule
Severity: High
Ensure Fedora GPG Key Installed
3
Rule
Severity: High
Ensure Oracle Linux GPG Key Installed
4
Rule
Severity: High
Verify '/proc/sys/crypto/fips_enabled' exists
2
Rule
Severity: High
Ensure gpgcheck Enabled In Main zypper Configuration
2
Rule
Severity: High
Ensure gpgcheck Enabled for All zypper Package Repositories
2
Rule
Severity: High
Ensure SUSE GPG Key Installed
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%