STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Red Hat Enterprise Linux 8 Security Technical Implementation Guide

V-230230

CAT II (Medium)

RHEL 8, for certificate-based authentication, must enforce authorized access to the corresponding private key.

Rule ID

SV-230230r1069287_rule

STIG

Red Hat Enterprise Linux 8 Security Technical Implementation Guide

Version

V2R7

CCIs

CCI-000186

Discussion

If an unauthorized user obtains access to a private key without a passcode, that user would have unauthorized access to any system where the associated public key has been installed.

Check Content

Verify the SSH private key files have a passcode.

For each private key stored on the system, use the following command:

$ sudo ssh-keygen -y -f /path/to/file
Enter passphrase:

If the contents of the key are displayed, this is a finding.

Fix Text

Create a new private and public key pair that utilizes a passcode with the following command:

$ sudo ssh-keygen -p -f /path/to/file