Chapter 5. Security Practices
5.1. Security Practices Overview
The Security Practices tests also known as cloud/security confirm that the image follows a minimum set of standard security practices. They also confirm (but do not require at this time) that the latest Red Hat security updates are installed.
The cloud/security test includes the following subtests:
5.2. Password Configuration
Confirms the user password configuration is either certificates or SHA-512 for RHEL 6 & 7. This ensures that the image follows standard encryption/decryption mechanisms for optimal security.
Success Criteria:
User authentication must be configured to certificates or SHA-512 for RHEL 6 or 7.
5.3. RPM Freshness
Confirms that all important and critical security errata released against Red Hat packages that are included in the image are installed. Red Hat encourages partners to update and recertify their images whenever an errata is released. This test displays status (REVIEW) at runtime as it requires review at Red Hat to confirm success or failure. For more information on Red Hat security ratings, refer to https://access.redhat.com/security/updates/classification.
Success Criteria:
All important and critical security errata released for installed Red Hat packages are current.
5.4. SELinux Enforcing
Confirms that SELinux is running in enforcing mode on the image (preferred) or is running in permissive mode. Security-Enhanced Linux (SELinux) adds Mandatory Access Control (MAC) to the Linux kernel, and is enabled by default in Red Hat Enterprise Linux.
SELinux policy is administratively-defined, enforced system-wide, and is not set at user discretion reducing vulnerability to privilege escalation attacks helping limit the damage made by configuration mistakes. If a process becomes compromised, the attacker only has access to the normal functions of that process, and to files the process has been configured to have access to.
For more information on SELinux in RHEL, refer:
Success Criteria:
SELinux is configured and running in enforcing mode on the image (preferred) or permissive mode.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.