Install the dracut-fips Package
An XCCDF Rule
Description
To enable FIPS, the system requires that the dracut-fips
package be installed.
The dracut-fips
package can be installed with the following command:
$ sudo yum install dracut-fips
warning alert: Regulatory Warning
System Crypto Modules must be provided by a vendor that undergoes
FIPS-140 certifications.
FIPS-140 is applicable to all Federal agencies that use
cryptographic-based security systems to protect sensitive information
in computer and telecommunication systems (including voice systems) as
defined in Section 5131 of the Information Technology Management Reform
Act of 1996, Public Law 104-106. This standard shall be used in
designing and implementing cryptographic modules that Federal
departments and agencies operate or are operated for them under
contract. See https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-2.pdf
To meet this, the system has to have cryptographic software provided by
a vendor that has undergone this certification. This means providing
documentation, test results, design information, and independent third
party review by an accredited lab. While open source software is
capable of meeting this, it does not meet FIPS-140 unless the vendor
submits to this process.
Rationale
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating system must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.
- ID
- xccdf_org.ssgproject.content_rule_package_dracut-fips_installed
- Severity
- Medium
- References
- Updated
Remediation - Anaconda Pre-Install Instructions
package --add=dracut-fips
Remediation - OS Build Blueprint
[[packages]]
name = "dracut-fips"
version = "*"
Remediation - Ansible
- name: Ensure dracut-fips is installed
package:
name: dracut-fips
state: present
when:
- ( ansible_virtualization_type not in ["docker", "lxc", "openvz", "podman", "container"]
Remediation - Shell Script
# Remediation is applicable only in certain platforms
if ( [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ] && ! ( [ "${container:-}" == "bwrap-osbuild" ] ) ) && { [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ]; }; then
if ! rpm -q --quiet "dracut-fips" ; then
yum install -y "dracut-fips"
fi
Remediation - Puppet
include install_dracut-fips
class install_dracut-fips {
package { 'dracut-fips':
ensure => 'installed',
}