The Red Hat Enterprise Linux operating system must ensure cryptographic verification of vendor software packages.
An XCCDF Rule
Description
Cryptographic verification of vendor software packages ensures that all software packages are obtained from a valid source and protects against spoofing that could lead to installation of malware on the system. Red Hat cryptographically signs all software packages, which includes updates, with a GPG key to verify that they are valid.
- ID
- SV-256968r902687_rule
- Version
- RHEL-07-010019
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Install Red Hat package-signing keys on the system and verify their fingerprints match vendor values.
Insert RHEL 7 installation disc or attach RHEL 7 installation image to the system. Mount the disc or image to make the contents accessible inside the system.
Assuming the mounted location is "/media/cdrom", use the following command to copy Red Hat GPG key file onto the system: