RHEL 8 STIG Version Comparison
Red Hat Enterprise Linux 8 Security Technical Implementation Guide
Comparison
There are 40 differences between versions v2 r4 (July 2, 2025) (the "left" version) and v2 r6 (Jan. 5, 2026) (the "right" version).
Check RHEL-08-010015 was added to the benchmark in the "right" version.
This check's original form is available here.
Text Differences
Title
RHEL 8 must have the crypto-policies package installed.
Check Content
Verify the RHEL 8 crypto-policies package is installed with the following command: $ sudo dnf list --installed crypto-policies Updating Subscription Management repositories. Installed Packages crypto-policies.noarch 20230731-1.git3177e06.el8 @rhel-8-for-x86_64-baseos-rpms If the crypto-policies package is not installed, this is a finding.
Discussion
Centralized cryptographic policies simplify applying secure ciphers across an operating system and the applications that run on that operating system. Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. Satisfies: SRG-OS-000396-GPOS-00176, SRG-OS-000393-GPOS-00173, SRG-OS-000394-GPOS-00174
Fix
Install the crypto-policies package (if the package is not already installed) with the following command: $ sudo dnf -y install crypto-policies