STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Red Hat Enterprise Linux 10 Security Technical Implementation Guide

V-281005

CAT II (Medium)

RHEL 10 must have the "pkcs11-provider" package installed.

Rule ID

SV-281005r1195395_rule

STIG

Red Hat Enterprise Linux 10 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000765CCI-004046CCI-001954

Discussion

Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor authentication requires using two or more factors to achieve authentication. A privileged account is defined as an information system account with authorizations of a privileged user. The DOD common access card (CAC) with DOD-approved PKI is an example of multifactor authentication. Satisfies: SRG-OS-000105-GPOS-00052, SRG-OS-000375-GPOS-00160, SRG-OS-000377-GPOS-00162

Check Content

Note: If the system administrator demonstrates the use of an approved alternate multifactor authentication method, this requirement is not applicable.

Verify RHEL 10 has the "openssl-pkcs11" package installed with the following command:

$ sudo dnf list --installed pkcs11-provider
Installed Packages
pkcs11-provider.x86_64                           1.0-3.el10_0                            @rhel-10-for-x86_64-baseos-rpms

If the "openssl-pkcs11" package is not installed, this is a finding.

Fix Text

Configure RHEL 10 to have the "openssl-pkcs11" package installed with the following command:

$ sudo dnf -y install pkcs11-provider