SV-230223r627750_rule
V-230223
SRG-OS-000033-GPOS-00014
RHEL-08-010020
CAT I
10
Configure the operating system to implement DoD-approved encryption by following the steps below:
To enable strict FIPS compliance, the fips=1 kernel option needs to be added to the kernel boot parameters during system installation so key generation is done with FIPS-approved algorithms and continuous monitoring tests in place.
Enable FIPS mode after installation (not strict FIPS compliant) with the following command:
$ sudo fips-mode-setup --enable
Reboot the system for the changes to take effect.
Verify the operating system implements DoD-approved encryption to protect the confidentiality of remote access sessions.
Check to see if FIPS mode is enabled with the following command:
$ sudo fipscheck
usage: fipscheck [-s <hmac-suffix>] <paths-to-files>
fips mode is on
If FIPS mode is "on", check to see if the kernel boot parameter is configured for FIPS mode with the following command:
$ sudo grub2-editenv - list | grep fips
kernelopts=root=/dev/mapper/rhel-root ro crashkernel=auto resume=/dev/mapper/rhel-swap rd.lvm.lv=rhel/root rd.lvm.lv=rhel/swap rhgb quiet fips=1 boot=UUID=8d171156-cd61-421c-ba41-1c021ac29e82
If the kernel boot parameter is configured to use FIPS mode, check to see if the system is in FIPS mode with the following command:
$ sudo cat /proc/sys/crypto/fips_enabled
1
If FIPS mode is not "on", the kernel boot parameter is not configured for FIPS mode, or the system does not have a value of "1" for "fips_enabled" in "/proc/sys/crypto", this is a finding.
V-230223
False
RHEL-08-010020
Verify the operating system implements DoD-approved encryption to protect the confidentiality of remote access sessions.
Check to see if FIPS mode is enabled with the following command:
$ sudo fipscheck
usage: fipscheck [-s <hmac-suffix>] <paths-to-files>
fips mode is on
If FIPS mode is "on", check to see if the kernel boot parameter is configured for FIPS mode with the following command:
$ sudo grub2-editenv - list | grep fips
kernelopts=root=/dev/mapper/rhel-root ro crashkernel=auto resume=/dev/mapper/rhel-swap rd.lvm.lv=rhel/root rd.lvm.lv=rhel/swap rhgb quiet fips=1 boot=UUID=8d171156-cd61-421c-ba41-1c021ac29e82
If the kernel boot parameter is configured to use FIPS mode, check to see if the system is in FIPS mode with the following command:
$ sudo cat /proc/sys/crypto/fips_enabled
1
If FIPS mode is not "on", the kernel boot parameter is not configured for FIPS mode, or the system does not have a value of "1" for "fips_enabled" in "/proc/sys/crypto", this is a finding.
M
2921