|
8 | 8 | The Compliance Operator provides the following compliance profiles:
|
9 | 9 |
|
10 | 10 | .Supported compliance profiles
|
11 |
| -[cols="10%,40%,10%,40%", options="header"] |
| 11 | +[cols="10%,40%,10%,40%,10%", options="header"] |
12 | 12 |
|
13 | 13 | |===
|
14 | 14 | |Profile
|
15 | 15 | |Profile title
|
16 |
| -|Compliance Operator version |
| 16 | +|Compliance Operator version |
17 | 17 | |Industry compliance benchmark
|
| 18 | +|Supported architectures |
18 | 19 |
|
19 | 20 | |ocp4-cis
|
20 | 21 | |CIS Red Hat OpenShift Container Platform 4 Benchmark
|
21 | 22 | |0.1.39+
|
22 | 23 | |link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] footnote:cisbenchmark[To locate the CIS RedHat OpenShift Container Platform v4 Benchmark, go to link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks] and type `Kubernetes` in the search box. Click on *Kubernetes* and then *Download Latest CIS Benchmark*, where you can then register to download the benchmark.]
|
| 24 | +|`x86_64` |
| 25 | + `ppc64le` |
| 26 | + `s390x` |
23 | 27 |
|
24 | 28 | |ocp4-cis-node
|
25 | 29 | |CIS Red Hat OpenShift Container Platform 4 Benchmark
|
26 | 30 | |0.1.39+
|
27 | 31 | |link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] footnote:cisbenchmark[]
|
| 32 | +|`x86_64` |
| 33 | + `ppc64le` |
| 34 | + `s390x` |
28 | 35 |
|
29 | 36 | |ocp4-e8
|
30 | 37 | |Australian Cyber Security Centre (ACSC) Essential Eight
|
31 | 38 | |0.1.39+
|
32 | 39 | |link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers]
|
| 40 | +|`x86_64` |
33 | 41 |
|
34 | 42 | |ocp4-moderate
|
35 | 43 | |NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform level
|
36 | 44 | |0.1.39+
|
37 | 45 | |link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
|
| 46 | +|`x86_64` |
| 47 | + |
| 48 | +|rhcos4-e8 |
| 49 | +|Australian Cyber Security Centre (ACSC) Essential Eight |
| 50 | +|0.1.39+ |
| 51 | +|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers] |
| 52 | +|`x86_64` |
| 53 | + |
| 54 | +|rhcos4-moderate |
| 55 | +|NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS |
| 56 | +|0.1.39+ |
| 57 | +|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search] |
| 58 | +|`x86_64` |
38 | 59 |
|
39 | 60 | |ocp4-moderate-node
|
40 | 61 | |NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level
|
41 | 62 | |0.1.44+
|
42 | 63 | |link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
|
| 64 | +|`x86_64` |
43 | 65 |
|
44 | 66 | |ocp4-nerc-cip
|
45 | 67 | |North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Platform level
|
46 | 68 | |0.1.44+
|
47 | 69 | |link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards]
|
| 70 | +|`x86_64` |
48 | 71 |
|
49 | 72 | |ocp4-nerc-cip-node
|
50 | 73 | |North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Node level
|
51 | 74 | |0.1.44+
|
52 | 75 | |link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards]
|
| 76 | +|`x86_64` |
| 77 | + |
| 78 | +|rhcos4-nerc-cip |
| 79 | +|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for Red Hat Enterprise Linux CoreOS |
| 80 | +|0.1.44+ |
| 81 | +|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards] |
| 82 | +|`x86_64` |
53 | 83 |
|
54 | 84 | |ocp4-pci-dss
|
55 | 85 | |PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4
|
56 | 86 | |0.1.47+
|
57 | 87 | |link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
|
| 88 | +|`x86_64` |
58 | 89 |
|
59 | 90 | |ocp4-pci-dss-node
|
60 | 91 | |PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4
|
61 | 92 | |0.1.47+
|
62 | 93 | |link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
|
63 |
| - |
64 |
| -|rhcos4-e8 |
65 |
| -|Australian Cyber Security Centre (ACSC) Essential Eight |
66 |
| -|0.1.39+ |
67 |
| -|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers] |
68 |
| - |
69 |
| -|rhcos4-moderate |
70 |
| -|NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS |
71 |
| -|0.1.39+ |
72 |
| -|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search] |
73 |
| - |
74 |
| -|rhcos4-nerc-cip |
75 |
| -|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for Red Hat Enterprise Linux CoreOS |
76 |
| -|0.1.44+ |
77 |
| -|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards] |
| 94 | +|`x86_64` |
78 | 95 |
|
79 | 96 | |ocp4-high
|
80 | 97 | |NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Platform level
|
81 | 98 | |0.1.52+
|
82 | 99 | |link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
|
| 100 | +|`x86_64` |
83 | 101 |
|
84 | 102 | |ocp4-high-node
|
85 | 103 | |NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Node level
|
86 | 104 | |0.1.52+
|
87 | 105 | |link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
|
| 106 | +|`x86_64` |
88 | 107 |
|
89 | 108 | |rhcos4-high
|
90 | 109 | |NIST 800-53 High-Impact Baseline for Red Hat Enterprise Linux CoreOS
|
91 | 110 | |0.1.52+
|
92 | 111 | |link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
|
| 112 | +|`x86_64` |
93 | 113 | |===
|
0 commit comments