Skip to content

Commit 4100e5c

Browse files
authored
Merge pull request #76945 from rhmdnd/CMP-2583
CMP-2583: Update CO supported profiles to include supported platforms
2 parents 4384197 + 2443f8b commit 4100e5c

File tree

2 files changed

+24
-3
lines changed

2 files changed

+24
-3
lines changed

modules/compliance-supported-profiles.adoc

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
The Compliance Operator provides the following compliance profiles:
1010

1111
.Supported compliance profiles
12-
[cols="10%,40%,10%,10%,40%,10%", options="header"]
12+
[cols="10%,40%,10%,10%,40%,10%,40%", options="header"]
1313

1414
|===
1515
|Profile
@@ -18,27 +18,31 @@ The Compliance Operator provides the following compliance profiles:
1818
|Compliance Operator version
1919
|Industry compliance benchmark
2020
|Supported architectures
21+
|Supported platforms
2122

2223
|rhcos4-stig
2324
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift
2425
|Node
2526
|1.3.0+
2627
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG] ^[1]^
2728
|`x86_64`
29+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
2830

2931
|ocp4-stig-node
3032
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift
3133
|Node
3234
|1.3.0+
3335
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG] ^[1]^
3436
|`x86_64`
37+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
3538

3639
|ocp4-stig
3740
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift
3841
|Platform
3942
|1.3.0+
4043
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG] ^[1]^
4144
|`x86_64`
45+
|
4246

4347
|ocp4-cis-1-4
4448
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.4.0
@@ -48,6 +52,7 @@ The Compliance Operator provides the following compliance profiles:
4852
|`x86_64`
4953
`ppc64le`
5054
`s390x`
55+
|
5156

5257
|ocp4-cis-node-1-4
5358
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.4.0
@@ -57,6 +62,7 @@ The Compliance Operator provides the following compliance profiles:
5762
|`x86_64`
5863
`ppc64le`
5964
`s390x`
65+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
6066

6167
|ocp4-cis
6268
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.5.0
@@ -66,6 +72,7 @@ The Compliance Operator provides the following compliance profiles:
6672
|`x86_64`
6773
`ppc64le`
6874
`s390x`
75+
|
6976

7077
|ocp4-cis-node
7178
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.5.0
@@ -75,13 +82,15 @@ The Compliance Operator provides the following compliance profiles:
7582
|`x86_64`
7683
`ppc64le`
7784
`s390x`
85+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
7886

7987
|ocp4-e8
8088
|Australian Cyber Security Centre (ACSC) Essential Eight
8189
|Platform
8290
|0.1.39+
8391
|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers]
8492
|`x86_64`
93+
|
8594

8695
|ocp4-moderate
8796
|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform level
@@ -91,20 +100,23 @@ The Compliance Operator provides the following compliance profiles:
91100
|`x86_64`
92101
`ppc64le`
93102
`s390x`
103+
|
94104

95105
|rhcos4-e8
96106
|Australian Cyber Security Centre (ACSC) Essential Eight
97107
|Node
98108
|0.1.39+
99109
|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers]
100110
|`x86_64`
111+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
101112

102113
|rhcos4-moderate
103114
|NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS
104115
|Node
105116
|0.1.39+
106117
|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
107118
|`x86_64`
119+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
108120

109121
|ocp4-moderate-node
110122
|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level
@@ -114,27 +126,31 @@ The Compliance Operator provides the following compliance profiles:
114126
|`x86_64`
115127
`ppc64le`
116128
`s390x`
129+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
117130

118131
|ocp4-nerc-cip
119132
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Platform level
120133
|Platform
121134
|0.1.44+
122135
|link:https://www.nerc.com/pa/Stand/Pages/USRelStand.aspx[NERC CIP Standards]
123136
|`x86_64`
137+
|
124138

125139
|ocp4-nerc-cip-node
126140
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Node level
127141
|Node ^[2]^
128142
|0.1.44+
129143
|link:https://www.nerc.com/pa/Stand/Pages/USRelStand.aspx[NERC CIP Standards]
130144
|`x86_64`
145+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
131146

132147
|rhcos4-nerc-cip
133148
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for Red Hat Enterprise Linux CoreOS
134149
|Node
135150
|0.1.44+
136151
|link:https://www.nerc.com/pa/Stand/Pages/USRelStand.aspx[NERC CIP Standards]
137152
|`x86_64`
153+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
138154

139155
|ocp4-pci-dss
140156
|PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4
@@ -143,6 +159,7 @@ The Compliance Operator provides the following compliance profiles:
143159
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
144160
|`x86_64`
145161
`ppc64le`
162+
|
146163

147164
|ocp4-pci-dss-node
148165
|PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4
@@ -151,27 +168,31 @@ The Compliance Operator provides the following compliance profiles:
151168
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
152169
|`x86_64`
153170
`ppc64le`
171+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
154172

155173
|ocp4-high
156174
|NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Platform level
157175
|Platform
158176
|0.1.52+
159177
|link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
160178
|`x86_64`
179+
|
161180

162181
|ocp4-high-node
163182
|NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Node level
164183
|Node ^[2]^
165184
|0.1.52+
166185
|link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
167186
|`x86_64`
187+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
168188

169189
|rhcos4-high
170190
|NIST 800-53 High-Impact Baseline for Red Hat Enterprise Linux CoreOS
171191
|Node
172192
|0.1.52+
173193
|link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
174194
|`x86_64`
195+
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
175196
|===
176197
[.small]
177198
1. To locate the CIS {product-title} v4 Benchmark, go to link:https://www.cisecurity.org/benchmark/kubernetes[CIS Benchmarks] and click *Download Latest CIS Benchmark*, where you can then register to download the benchmark.
@@ -214,4 +235,4 @@ For example, the NIST High-Impact and Moderate-Impact profiles extend the CIS pr
214235

215236
|ocp4-nerc-cip-node
216237
|ocp4-moderate-node
217-
|===
238+
|===

security/compliance_operator/co-scans/compliance-operator-supported-profiles.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ authorized auditor to achieve compliance with a standard.
1818

1919
[IMPORTANT]
2020
====
21-
The Compliance Operator might report incorrect results on managed platforms, such as OpenShift Dedicated, Red Hat OpenShift Service on AWS, and Azure Red Hat OpenShift. For more information, see the link:https://access.redhat.com/solutions/6983418[Red Hat Knowledgebase Solution #6983418].
21+
The Compliance Operator might report incorrect results on some managed platforms, such as OpenShift Dedicated and Azure Red Hat OpenShift. For more information, see the link:https://access.redhat.com/solutions/6983418[Red Hat Knowledgebase Solution #6983418].
2222
====
2323

2424
include::modules/compliance-supported-profiles.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)