1. Home
  2. Security Hardening
  3. CIS Amazon Linux 2 STIG V1.0.0 L1
  4. Ensure updates, patches, and additional security software are installed

Ensure updates, patches, and additional security software are installed

Details

Periodically patches are released for included software either due to security flaws or to include additional functionality.

Rationale:

Newer patches may contain security enhancements that would not be available through the latest full update. As a result, it is recommended that the latest software patches be used to take advantage of the latest functionality. As with any software installation, organizations need to determine if a given update meets their requirements and verify the compatibility and supportability of any additional software against the update revision that is selected.

Solution

Use your package manager to update all packages on the system according to site policy.
The following command will install all available security updates:

# yum update –security

Notes:

Site policy may mandate a testing period before install onto production systems for available updates. The audit and remediation here only cover security updates. Non-security updates can be audited with and comparing against site policy:

# yum check-update

This Benchmark recommendation maps to:

Red Hat Enterprise Linux 7 Security Technical Implementation Guide:

Version 2, Release: 3 Benchmark Date: 26 Apr 2019

Vul ID: V-71999

Rule ID: SV-86623r4_rule

STIG ID: RHEL-07-020260

Severity: CAT II

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: System and Information Integrity.This control applies to the following type of system Unix.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles