|
8 | 8 | The Compliance Operator provides the following compliance profiles:
|
9 | 9 |
|
10 | 10 | .Supported compliance profiles
|
11 |
| -[cols="40%,50%,10%", options="header"] |
| 11 | +[cols="10%,40%,10%,40%", options="header"] |
12 | 12 |
|
13 | 13 | |===
|
14 |
| -|Profile name |
| 14 | +|Profile |
15 | 15 | |Profile title
|
16 | 16 | |Compliance Operator version
|
| 17 | +|Industry compliance benchmark |
17 | 18 |
|
18 | 19 | |ocp4-cis
|
19 |
| -|link:https://www.cisecurity.org/cis-benchmarks/[CIS Red Hat OpenShift Container Platform 4 Benchmark] |
| 20 | +|CIS Red Hat OpenShift Container Platform 4 Benchmark |
20 | 21 | |0.1.39+
|
| 22 | +|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] footnote:cisbenchmark[To locate the CIS RedHat OpenShift Container Platform v4 Benchmark, go to link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks] and type `Kubernetes` in the search box. Click on *Kubernetes* and then *Download Latest CIS Benchmark*, where you can then register to download the benchmark.] |
21 | 23 |
|
22 | 24 | |ocp4-cis-node
|
23 |
| -|link:https://www.cisecurity.org/cis-benchmarks/[CIS Red Hat OpenShift Container Platform 4 Benchmark] |
| 25 | +|CIS Red Hat OpenShift Container Platform 4 Benchmark |
24 | 26 | |0.1.39+
|
| 27 | +|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] footnote:cisbenchmark[] |
25 | 28 |
|
26 | 29 | |ocp4-e8
|
27 |
| -|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[Australian Cyber Security Centre (ACSC) Essential Eight] |
| 30 | +|Australian Cyber Security Centre (ACSC) Essential Eight |
28 | 31 | |0.1.39+
|
| 32 | +|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers] |
29 | 33 |
|
30 | 34 | |ocp4-moderate
|
31 |
| -|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform level] |
| 35 | +|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform level |
32 | 36 | |0.1.39+
|
| 37 | +|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search] |
33 | 38 |
|
34 | 39 | |ocp4-moderate-node
|
35 |
| -|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level] |
| 40 | +|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level |
36 | 41 | |0.1.44+
|
| 42 | +|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search] |
37 | 43 |
|
38 | 44 | |ocp4-nerc-cip
|
39 |
| -|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[North American Electric Reliability Corporation (NERC)] |
| 45 | +|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Platform level |
40 | 46 | |0.1.44+
|
| 47 | +|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards] |
41 | 48 |
|
42 | 49 | |ocp4-nerc-cip-node
|
43 |
| -|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[North American Electric Reliability Corporation (NERC)] |
| 50 | +|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Platform level |
44 | 51 | |0.1.44+
|
| 52 | +|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards] |
45 | 53 |
|
46 | 54 | |ocp4-pci-dss
|
47 |
| -|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4] |
| 55 | +|PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4 |
48 | 56 | |0.1.47+
|
| 57 | +|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library] |
49 | 58 |
|
50 | 59 | |ocp4-pci-dss-node
|
51 |
| -|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4] |
| 60 | +|PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4 |
52 | 61 | |0.1.47+
|
| 62 | +|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library] |
53 | 63 |
|
54 | 64 | |rhcos4-e8
|
55 |
| -|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[Australian Cyber Security Centre (ACSC) Essential Eight] |
| 65 | +|Australian Cyber Security Centre (ACSC) Essential Eight |
56 | 66 | |0.1.39+
|
| 67 | +|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers] |
57 | 68 |
|
58 | 69 | |rhcos4-moderate
|
59 |
| -|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS] |
| 70 | +|NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS |
60 | 71 | |0.1.39+
|
| 72 | +|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search] |
61 | 73 |
|
62 | 74 | |rhcos4-nerc-cip
|
63 |
| -|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[North American Electric Reliability Corporation (NERC)] |
| 75 | +|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for Red Hat Enterprise Linux CoreOS |
64 | 76 | |0.1.44+
|
65 |
| - |
| 77 | +|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards] |
66 | 78 | |===
|
67 | 79 |
|
0 commit comments