Skip to content

Commit 702aa9f

Browse files
authored
Merge pull request #40531 from kmccarron-rh/cmpprofile
OSDOCS-3161 Add Compliance benchmark column to Supported profiles table
2 parents fd90fa0 + a5a45ba commit 702aa9f

File tree

1 file changed

+27
-15
lines changed

1 file changed

+27
-15
lines changed

modules/compliance-supported-profiles.adoc

Lines changed: 27 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -8,60 +8,72 @@
88
The Compliance Operator provides the following compliance profiles:
99

1010
.Supported compliance profiles
11-
[cols="40%,50%,10%", options="header"]
11+
[cols="10%,40%,10%,40%", options="header"]
1212

1313
|===
14-
|Profile name
14+
|Profile
1515
|Profile title
1616
|Compliance Operator version
17+
|Industry compliance benchmark
1718

1819
|ocp4-cis
19-
|link:https://www.cisecurity.org/cis-benchmarks/[CIS Red Hat OpenShift Container Platform 4 Benchmark]
20+
|CIS Red Hat OpenShift Container Platform 4 Benchmark
2021
|0.1.39+
22+
|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] footnote:cisbenchmark[To locate the CIS RedHat OpenShift Container Platform v4 Benchmark, go to link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks] and type `Kubernetes` in the search box. Click on *Kubernetes* and then *Download Latest CIS Benchmark*, where you can then register to download the benchmark.]
2123

2224
|ocp4-cis-node
23-
|link:https://www.cisecurity.org/cis-benchmarks/[CIS Red Hat OpenShift Container Platform 4 Benchmark]
25+
|CIS Red Hat OpenShift Container Platform 4 Benchmark
2426
|0.1.39+
27+
|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] footnote:cisbenchmark[]
2528

2629
|ocp4-e8
27-
|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[Australian Cyber Security Centre (ACSC) Essential Eight]
30+
|Australian Cyber Security Centre (ACSC) Essential Eight
2831
|0.1.39+
32+
|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers]
2933

3034
|ocp4-moderate
31-
|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform level]
35+
|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform level
3236
|0.1.39+
37+
|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
3338

3439
|ocp4-moderate-node
35-
|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level]
40+
|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level
3641
|0.1.44+
42+
|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
3743

3844
|ocp4-nerc-cip
39-
|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[North American Electric Reliability Corporation (NERC)]
45+
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Platform level
4046
|0.1.44+
47+
|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards]
4148

4249
|ocp4-nerc-cip-node
43-
|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[North American Electric Reliability Corporation (NERC)]
50+
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Platform level
4451
|0.1.44+
52+
|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards]
4553

4654
|ocp4-pci-dss
47-
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4]
55+
|PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4
4856
|0.1.47+
57+
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
4958

5059
|ocp4-pci-dss-node
51-
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4]
60+
|PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4
5261
|0.1.47+
62+
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
5363

5464
|rhcos4-e8
55-
|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[Australian Cyber Security Centre (ACSC) Essential Eight]
65+
|Australian Cyber Security Centre (ACSC) Essential Eight
5666
|0.1.39+
67+
|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers]
5768

5869
|rhcos4-moderate
59-
|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS]
70+
|NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS
6071
|0.1.39+
72+
|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
6173

6274
|rhcos4-nerc-cip
63-
|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[North American Electric Reliability Corporation (NERC)]
75+
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for Red Hat Enterprise Linux CoreOS
6476
|0.1.44+
65-
77+
|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards]
6678
|===
6779

0 commit comments

Comments
 (0)