You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
CMP-2583: Update CO supported profiles to include supported platforms
With Compliance Operator 1.5.0, users can deploy the Compliance Operator
on ROSA HCP. Let's update the documentation to advertise that
functionality for profiles that are tested on ROSA HCP.
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.4.0
@@ -48,6 +52,7 @@ The Compliance Operator provides the following compliance profiles:
48
52
|`x86_64`
49
53
`ppc64le`
50
54
`s390x`
55
+
|
51
56
52
57
|ocp4-cis-node-1-4
53
58
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.4.0
@@ -57,6 +62,7 @@ The Compliance Operator provides the following compliance profiles:
57
62
|`x86_64`
58
63
`ppc64le`
59
64
`s390x`
65
+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
60
66
61
67
|ocp4-cis
62
68
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.5.0
@@ -66,6 +72,7 @@ The Compliance Operator provides the following compliance profiles:
66
72
|`x86_64`
67
73
`ppc64le`
68
74
`s390x`
75
+
|
69
76
70
77
|ocp4-cis-node
71
78
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.5.0
@@ -75,13 +82,15 @@ The Compliance Operator provides the following compliance profiles:
75
82
|`x86_64`
76
83
`ppc64le`
77
84
`s390x`
85
+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
78
86
79
87
|ocp4-e8
80
88
|Australian Cyber Security Centre (ACSC) Essential Eight
81
89
|Platform
82
90
|0.1.39+
83
91
|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers]
84
92
|`x86_64`
93
+
|
85
94
86
95
|ocp4-moderate
87
96
|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform level
@@ -91,20 +100,23 @@ The Compliance Operator provides the following compliance profiles:
91
100
|`x86_64`
92
101
`ppc64le`
93
102
`s390x`
103
+
|
94
104
95
105
|rhcos4-e8
96
106
|Australian Cyber Security Centre (ACSC) Essential Eight
97
107
|Node
98
108
|0.1.39+
99
109
|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers]
100
110
|`x86_64`
111
+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
101
112
102
113
|rhcos4-moderate
103
114
|NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
108
120
109
121
|ocp4-moderate-node
110
122
|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level
@@ -114,27 +126,31 @@ The Compliance Operator provides the following compliance profiles:
114
126
|`x86_64`
115
127
`ppc64le`
116
128
`s390x`
129
+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
117
130
118
131
|ocp4-nerc-cip
119
132
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Platform level
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Node level
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
131
146
132
147
|rhcos4-nerc-cip
133
148
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for Red Hat Enterprise Linux CoreOS
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
175
196
|===
176
197
[.small]
177
198
1. To locate the CIS {product-title} v4 Benchmark, go to link:https://www.cisecurity.org/benchmark/kubernetes[CIS Benchmarks] and click *Download Latest CIS Benchmark*, where you can then register to download the benchmark.
@@ -214,4 +235,4 @@ For example, the NIST High-Impact and Moderate-Impact profiles extend the CIS pr
Copy file name to clipboardExpand all lines: security/compliance_operator/co-scans/compliance-operator-supported-profiles.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ authorized auditor to achieve compliance with a standard.
18
18
19
19
[IMPORTANT]
20
20
====
21
-
The Compliance Operator might report incorrect results on managed platforms, such as OpenShift Dedicated, Red Hat OpenShift Service on AWS, and Azure Red Hat OpenShift. For more information, see the link:https://access.redhat.com/solutions/6983418[Red Hat Knowledgebase Solution #6983418].
21
+
The Compliance Operator might report incorrect results on some managed platforms, such as OpenShift Dedicated and Azure Red Hat OpenShift. For more information, see the link:https://access.redhat.com/solutions/6983418[Red Hat Knowledgebase Solution #6983418].
0 commit comments