이 콘텐츠는 선택한 언어로 제공되지 않습니다.

Chapter 7. Security considerations in Satellite


Satellite supports multiple security mechanisms to provide additional layers of protection. Implementing these security features enhances the overall security of your Satellite deployment.

Note

These security considerations apply to both Satellite Server and Capsule Server environments.

Federal Information Processing Standards (FIPS) Mode

Satellite supports running on FIPS-enabled Red Hat Enterprise Linux hosts to comply with security standards for cryptographic modules. However, Satellite itself is not FIPS-certified. In addition, you cannot enable FIPS mode after the installation of Satellite.

FIPS mode enforces the use of validated cryptographic algorithms and modules. Enabling FIPS mode ensures that all cryptographic operations within the system adhere to strict security standards.

For more information, see Switching RHEL to FIPS mode in Red Hat Enterprise Linux 9 Security hardening.

Note

Satellite supports DEFAULT and FIPS crypto-policies. The FUTURE crypto-policy is not supported for Satellite Server and Capsule Server installations. The FUTURE policy is a stricter forward-looking security level intended for testing a possible future policy. For more information, see Using system-wide cryptographic policies in Red Hat Enterprise Linux 9 Security hardening.

File Access Policy Daemon (fapolicyd)

By enabling fapolicyd on your Satellite Server, you can monitor and control file and directory access, which provides an additional security layer.

This feature helps prevent unauthorized code execution and enhances system integrity. You can enable or disable fapolicyd on both Satellite Server and Capsule Server at any time, depending on your security requirements.

For additional information about fapolicyd, including instructions on enabling it, see Blocking and allowing applications by using fapolicyd in Red Hat Enterprise Linux 9 Security hardening.

Post-Quantum Cryptography (PQC)
Red Hat does not support PQC compatibility for Satellite.
Security-Enhanced Linux (SELinux)

Satellite requires SELinux, a mandatory access control system that restricts system access and reduces the risk of security vulnerabilities. SELinux enforces policies that define which processes can access specific system resources, providing protection against unauthorized access and exploitation.

To maintain a high-security environment, Red Hat recommends running Satellite with SELinux in enforcing mode. It ensures that access control policies are strictly enforced, minimizing the risk of privilege escalation or unauthorized actions.

Additional Security Recommendations
Regularly updating security policies and configurations, as well as monitoring system logs and security policies, can help detect and respond to potential threats effectively.
Security compliance
For certain use cases, your Satellite Server must meet the requirements of security compliance. You can use Security Content Automation Protocol (SCAP) to scan your system for security policy compliance. For more information, see Managing security compliance.
맨 위로 이동
Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2025 Red Hat