RHEL 9 must ensure cryptographic verification of vendor software packages.
An XCCDF Rule
Description
Cryptographic verification of vendor software packages ensures that all software packages are obtained from a valid source and protects against spoofing that could lead to installation of malware on the system. Red Hat cryptographically signs all software packages, which includes updates, with a GPG key to verify that they are valid.
- ID
- SV-257819r1015075_rule
- Version
- RHEL-09-214010
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Install Red Hat package-signing keys on the system and verify their fingerprints match vendor values.
Insert RHEL 9 installation disc or attach RHEL 9 installation image to the system. Mount the disc or image to make the contents accessible inside the system.
Assuming the mounted location is "/media/cdrom", use the following command to copy Red Hat GPG key file onto the system: