|
2 | 2 | //
|
3 | 3 | // * security/compliance_operator/
|
4 | 4 |
|
| 5 | +:_content-type: CONCEPT |
5 | 6 | [id="compliance-supported-profiles_{context}"]
|
6 | 7 | = Compliance profiles
|
7 | 8 |
|
8 | 9 | The Compliance Operator provides the following compliance profiles:
|
9 | 10 |
|
10 | 11 | .Supported compliance profiles
|
11 |
| -[cols="10%,40%,10%,40%,10%", options="header"] |
| 12 | +[cols="10%,40%,10%,10%,40%,10%", options="header"] |
12 | 13 |
|
13 | 14 | |===
|
14 | 15 | |Profile
|
15 | 16 | |Profile title
|
| 17 | +|Application |
16 | 18 | |Compliance Operator version
|
17 | 19 | |Industry compliance benchmark
|
18 | 20 | |Supported architectures
|
19 | 21 |
|
20 | 22 | |ocp4-cis
|
21 | 23 | |CIS Red Hat OpenShift Container Platform 4 Benchmark
|
| 24 | +|Platform |
22 | 25 | |0.1.39+
|
23 |
| -|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] footnote:cisbenchmark[To locate the CIS RedHat OpenShift Container Platform v4 Benchmark, go to link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks] and type `Kubernetes` in the search box. Click on *Kubernetes* and then *Download Latest CIS Benchmark*, where you can then register to download the benchmark.] |
| 26 | +|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] ^[1]^ |
24 | 27 | |`x86_64`
|
25 | 28 | `ppc64le`
|
26 | 29 | `s390x`
|
27 | 30 |
|
28 | 31 | |ocp4-cis-node
|
29 | 32 | |CIS Red Hat OpenShift Container Platform 4 Benchmark
|
| 33 | +|Node ^[2]^ |
30 | 34 | |0.1.39+
|
31 |
| -|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] footnote:cisbenchmark[] |
| 35 | +|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] ^[1]^ |
32 | 36 | |`x86_64`
|
33 | 37 | `ppc64le`
|
34 | 38 | `s390x`
|
35 | 39 |
|
36 | 40 | |ocp4-e8
|
37 | 41 | |Australian Cyber Security Centre (ACSC) Essential Eight
|
| 42 | +|Platform |
38 | 43 | |0.1.39+
|
39 | 44 | |link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers]
|
40 | 45 | |`x86_64`
|
41 | 46 |
|
42 | 47 | |ocp4-moderate
|
43 | 48 | |NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform level
|
| 49 | +|Platform |
44 | 50 | |0.1.39+
|
45 | 51 | |link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
|
46 | 52 | |`x86_64`
|
47 | 53 |
|
48 | 54 | |rhcos4-e8
|
49 | 55 | |Australian Cyber Security Centre (ACSC) Essential Eight
|
| 56 | +|Node |
50 | 57 | |0.1.39+
|
51 | 58 | |link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers]
|
52 | 59 | |`x86_64`
|
53 | 60 |
|
54 | 61 | |rhcos4-moderate
|
55 | 62 | |NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS
|
| 63 | +|Node |
56 | 64 | |0.1.39+
|
57 | 65 | |link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
|
58 | 66 | |`x86_64`
|
59 | 67 |
|
60 | 68 | |ocp4-moderate-node
|
61 | 69 | |NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level
|
| 70 | +|Node ^[2]^ |
62 | 71 | |0.1.44+
|
63 | 72 | |link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
|
64 | 73 | |`x86_64`
|
65 | 74 |
|
66 | 75 | |ocp4-nerc-cip
|
67 | 76 | |North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Platform level
|
| 77 | +|Platform |
68 | 78 | |0.1.44+
|
69 | 79 | |link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards]
|
70 | 80 | |`x86_64`
|
71 | 81 |
|
72 | 82 | |ocp4-nerc-cip-node
|
73 | 83 | |North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Node level
|
| 84 | +|Node ^[2]^ |
74 | 85 | |0.1.44+
|
75 | 86 | |link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards]
|
76 | 87 | |`x86_64`
|
77 | 88 |
|
78 | 89 | |rhcos4-nerc-cip
|
79 | 90 | |North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for Red Hat Enterprise Linux CoreOS
|
| 91 | +|Node |
80 | 92 | |0.1.44+
|
81 | 93 | |link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards]
|
82 | 94 | |`x86_64`
|
83 | 95 |
|
84 | 96 | |ocp4-pci-dss
|
85 | 97 | |PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4
|
| 98 | +|Platform |
86 | 99 | |0.1.47+
|
87 | 100 | |link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
|
88 | 101 | |`x86_64`
|
89 | 102 | `ppc64le`
|
90 | 103 |
|
91 | 104 | |ocp4-pci-dss-node
|
92 | 105 | |PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4
|
| 106 | +|Node ^[2]^ |
93 | 107 | |0.1.47+
|
94 | 108 | |link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
|
95 | 109 | |`x86_64`
|
96 | 110 | `ppc64le`
|
97 |
| - |
| 111 | + |
98 | 112 | |ocp4-high
|
99 | 113 | |NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Platform level
|
| 114 | +|Platform |
100 | 115 | |0.1.52+
|
101 | 116 | |link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
|
102 | 117 | |`x86_64`
|
103 | 118 |
|
104 | 119 | |ocp4-high-node
|
105 | 120 | |NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Node level
|
| 121 | +|Node ^[2]^ |
106 | 122 | |0.1.52+
|
107 | 123 | |link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
|
108 | 124 | |`x86_64`
|
109 | 125 |
|
110 | 126 | |rhcos4-high
|
111 | 127 | |NIST 800-53 High-Impact Baseline for Red Hat Enterprise Linux CoreOS
|
| 128 | +|Node |
112 | 129 | |0.1.52+
|
113 | 130 | |link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
|
114 | 131 | |`x86_64`
|
115 |
| -|=== |
| 132 | +|=== |
| 133 | +[.small] |
| 134 | +1. To locate the CIS {product-title} v4 Benchmark, go to link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks] and type `Kubernetes` in the search box. Click on *Kubernetes* and then *Download Latest CIS Benchmark*, where you can then register to download the benchmark. |
| 135 | +2. Node profiles must be used with the relevant Platform profile. For more information, see xref:../../security/compliance_operator/compliance-operator-understanding.adoc#compliance_profile_typesunderstanding-compliance[Compliance Operator profile types]. |
0 commit comments