Skip to content

Commit 16eef29

Browse files
authored
Merge pull request #62725 from sheriff-rh/CMP-2090
2 parents e1659c8 + d2aeb3c commit 16eef29

File tree

2 files changed

+26
-5
lines changed

2 files changed

+26
-5
lines changed

modules/compliance-supported-profiles.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,18 +20,18 @@ The Compliance Operator provides the following compliance profiles:
2020
|Supported architectures
2121

2222
|ocp4-cis
23-
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.1.0
23+
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.4.0
2424
|Platform
25-
|0.1.39+
25+
|1.2.0+
2626
|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] ^[1]^
2727
|`x86_64`
2828
`ppc64le`
2929
`s390x`
3030

3131
|ocp4-cis-node
32-
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.1.0
32+
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.4.0
3333
|Node ^[2]^
34-
|0.1.39+
34+
|1.2.0+
3535
|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] ^[1]^
3636
|`x86_64`
3737
`ppc64le`
@@ -131,5 +131,5 @@ The Compliance Operator provides the following compliance profiles:
131131
|`x86_64`
132132
|===
133133
[.small]
134-
1. To locate the CIS {product-title} v4 Benchmark, go to link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks] and type `Kubernetes` in the search box. Click on *Kubernetes* and then *Download Latest CIS Benchmark*, where you can then register to download the benchmark.
134+
1. To locate the CIS {product-title} v4 Benchmark, go to link:https://www.cisecurity.org/benchmark/kubernetes[CIS Benchmarks] and click *Download Latest CIS Benchmark*, where you can then register to download the benchmark.
135135
2. Node profiles must be used with the relevant Platform profile. For more information, see xref:../../security/compliance_operator/compliance-operator-understanding.adoc#compliance_profile_typesunderstanding-compliance[Compliance Operator profile types].

security/compliance_operator/compliance-operator-release-notes.adoc

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,27 @@ For an overview of the Compliance Operator, see xref:../../security/compliance_o
1515

1616
To access the latest release, see xref:../../security/compliance_operator/compliance-operator-updating.adoc#olm-preparing-upgrade_compliance-operator-updating[Updating the Compliance Operator].
1717

18+
[id="compliance-operator-release-notes-1-2-0"]
19+
== OpenShift Compliance Operator 1.2.0
20+
21+
The following advisory is available for the OpenShift Compliance Operator 1.2.0:
22+
23+
* link:https://access.redhat.com/errata/RHBA-2023:4245[RHBA-2023:4245 - OpenShift Compliance Operator enhancement update]
24+
25+
[id="compliance-operator-1-2-0-new-features-and-enhancements"]
26+
=== New features and enhancements
27+
28+
* The CIS {product-title} 4 Benchmark v1.4.0 profile is now available for platform and node applications. To locate the CIS {product-title} v4 Benchmark, go to link:https://www.cisecurity.org/benchmark/kubernetes[CIS Benchmarks] and click *Download Latest CIS Benchmark*, where you can then register to download the benchmark.
29+
+
30+
[IMPORTANT]
31+
====
32+
Upgrading to Compliance Operator 1.2.0 will overwrite the CIS {product-title} 4 Benchmark 1.1.0 profiles.
33+
34+
If your {product-title} environment contains existing `cis` and `cis-node` remediations, there might be some differences in scan results after upgrading to Compliance Operator 1.2.0.
35+
====
36+
37+
* Additional clarity for auditing security context constraints (SCCs) is now available for the `scc-limit-container-allowed-capabilities` rule.
38+
1839
[id="compliance-operator-release-notes-1-1-0"]
1940
== OpenShift Compliance Operator 1.1.0
2041

0 commit comments

Comments
 (0)