|
8 | 8 | The Compliance Operator provides the following compliance profiles: |
9 | 9 |
|
10 | 10 | .Supported compliance profiles |
11 | | -[cols="40%,50%,10%", options="header"] |
| 11 | +[cols="10%,40%,10%,40%", options="header"] |
12 | 12 |
|
13 | 13 | |=== |
14 | | -|Profile name |
| 14 | +|Profile |
15 | 15 | |Profile title |
16 | 16 | |Compliance Operator version |
| 17 | +|Industry compliance benchmark |
17 | 18 |
|
18 | 19 | |ocp4-cis |
19 | | -|link:https://www.cisecurity.org/cis-benchmarks/[CIS Red Hat OpenShift Container Platform 4 Benchmark] |
| 20 | +|CIS Red Hat OpenShift Container Platform 4 Benchmark |
20 | 21 | |0.1.39+ |
| 22 | +|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] footnote:cisbenchmark[To locate the CIS RedHat OpenShift Container Platform v4 Benchmark, go to link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks] and type `Kubernetes` in the search box. Click on *Kubernetes* and then *Download Latest CIS Benchmark*, where you can then register to download the benchmark.] |
21 | 23 |
|
22 | 24 | |ocp4-cis-node |
23 | | -|link:https://www.cisecurity.org/cis-benchmarks/[CIS Red Hat OpenShift Container Platform 4 Benchmark] |
| 25 | +|CIS Red Hat OpenShift Container Platform 4 Benchmark |
24 | 26 | |0.1.39+ |
| 27 | +|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] footnote:cisbenchmark[] |
25 | 28 |
|
26 | 29 | |ocp4-e8 |
27 | | -|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[Australian Cyber Security Centre (ACSC) Essential Eight] |
| 30 | +|Australian Cyber Security Centre (ACSC) Essential Eight |
28 | 31 | |0.1.39+ |
| 32 | +|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers] |
29 | 33 |
|
30 | 34 | |ocp4-moderate |
31 | | -|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform level] |
| 35 | +|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform level |
32 | 36 | |0.1.39+ |
| 37 | +|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search] |
33 | 38 |
|
34 | 39 | |ocp4-moderate-node |
35 | | -|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level] |
| 40 | +|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level |
36 | 41 | |0.1.44+ |
| 42 | +|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search] |
37 | 43 |
|
38 | 44 | |ocp4-nerc-cip |
39 | | -|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[North American Electric Reliability Corporation (NERC)] |
| 45 | +|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Platform level |
40 | 46 | |0.1.44+ |
| 47 | +|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards] |
41 | 48 |
|
42 | 49 | |ocp4-nerc-cip-node |
43 | | -|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[North American Electric Reliability Corporation (NERC)] |
| 50 | +|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Platform level |
44 | 51 | |0.1.44+ |
| 52 | +|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards] |
45 | 53 |
|
46 | 54 | |ocp4-pci-dss |
47 | | -|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4] |
| 55 | +|PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4 |
48 | 56 | |0.1.47+ |
| 57 | +|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library] |
49 | 58 |
|
50 | 59 | |ocp4-pci-dss-node |
51 | | -|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4] |
| 60 | +|PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4 |
52 | 61 | |0.1.47+ |
| 62 | +|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library] |
53 | 63 |
|
54 | 64 | |rhcos4-e8 |
55 | | -|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[Australian Cyber Security Centre (ACSC) Essential Eight] |
| 65 | +|Australian Cyber Security Centre (ACSC) Essential Eight |
56 | 66 | |0.1.39+ |
| 67 | +|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers] |
57 | 68 |
|
58 | 69 | |rhcos4-moderate |
59 | | -|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS] |
| 70 | +|NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS |
60 | 71 | |0.1.39+ |
| 72 | +|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search] |
61 | 73 |
|
62 | 74 | |rhcos4-nerc-cip |
63 | | -|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[North American Electric Reliability Corporation (NERC)] |
| 75 | +|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for Red Hat Enterprise Linux CoreOS |
64 | 76 | |0.1.44+ |
65 | | - |
| 77 | +|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards] |
66 | 78 | |=== |
67 | 79 |
|
0 commit comments