Syntax is documented on: - man pages `man crypto-policies` - Red Hat system-wide cryptographic policies documentation Example subpolicy files are located in: `/usr/share/crypto-policies/policies/modules/` ### See also 1. [[How to disable weak MAC algorithms on a Linux server for SSH?]] 2. [[How to check which Crypto Policy is currently applied on Linux machine?]]