Skip to content

The Red Hat Enterprise Linux operating system must ensure cryptographic verification of vendor software packages.

An XCCDF Rule

Description

Cryptographic verification of vendor software packages ensures that all software packages are obtained from a valid source and protects against spoofing that could lead to installation of malware on the system. Red Hat cryptographically signs all software packages, which includes updates, with a GPG key to verify that they are valid.

ID
SV-256968r902687_rule
Version
RHEL-07-010019
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Install Red Hat package-signing keys on the system and verify their fingerprints match vendor values.

Insert RHEL 7 installation disc or attach RHEL 7 installation image to the system. Mount the disc or image to make the contents accessible inside the system.

Assuming the mounted location is "/media/cdrom", use the following command to copy Red Hat GPG key file onto the system: