Skip to content

Commit eb4f881

Browse files
authored
Merge pull request #47169 from sheriff-rh/CMP-1253
CMP-1253 updated CO supported profiles table
2 parents d316501 + 1639215 commit eb4f881

File tree

2 files changed

+31
-1
lines changed

2 files changed

+31
-1
lines changed

modules/compliance-supported-profiles.adoc

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,5 +75,19 @@ The Compliance Operator provides the following compliance profiles:
7575
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for Red Hat Enterprise Linux CoreOS
7676
|0.1.44+
7777
|link:https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx[NERC CIP Standards]
78-
|===
7978

79+
|ocp4-high
80+
|NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Platform level
81+
|0.1.52+
82+
|link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
83+
84+
|ocp4-high-node
85+
|NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Node level
86+
|0.1.52+
87+
|link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
88+
89+
|rhcos4-high
90+
|NIST 800-53 High-Impact Baseline for Red Hat Enterprise Linux CoreOS
91+
|0.1.52+
92+
|link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
93+
|===

security/compliance_operator/compliance-operator-release-notes.adoc

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,11 @@ The following advisory is available for the OpenShift Compliance Operator 0.1.52
2020

2121
* link:https://access.redhat.com/errata/RHBA-2022:4657[RHBA-2022:4657 - OpenShift Compliance Operator bug fix update]
2222

23+
[id="compliance-operator-0-1-52-new-features-and-enhancements"]
24+
== New features and enhancements
25+
26+
* The FedRAMP high SCAP profile is now available for use in {product-title} environments. For more information, See xref:../compliance_operator/compliance-operator-supported-profiles.adoc#compliance-operator-supported-profiles[Supported compliance profiles].
27+
2328
[id="compliance-operator-0-1-52-bug-fixes"]
2429
=== Bug fixes
2530

@@ -33,6 +38,17 @@ The following advisory is available for the OpenShift Compliance Operator 0.1.52
3338

3439
* Previously, the Machine Config Operator used `base64` instead of `url-encoded` code in the latest release, causing Compliance Operator remediation to fail. Now, the Compliance Operator checks encoding to handle both `base64` and `url-encoded` Machine Config code and the remediation applies correctly. (link:https://bugzilla.redhat.com/show_bug.cgi?id=2082431[*BZ#2082431*])
3540

41+
[id="compliance-operator-0-1-52-known-issue"]
42+
=== Known issue
43+
44+
* When `"debug":true` is set within the `ScanSettingBinding` object, the pods generated by the `ScanSettingBinding` object are not removed when that binding is deleted. As a workaround, run the following command to delete the remaining pods:
45+
+
46+
----
47+
$ oc delete pods -l compliance.openshift.io/scan-name=ocp4-cis
48+
----
49+
+
50+
(link:https://bugzilla.redhat.com/show_bug.cgi?id=2092913[*BZ#2092913*])
51+
3652
[id="compliance-operator-release-notes-0-1-49"]
3753
== OpenShift Compliance Operator 0.1.49
3854

0 commit comments

Comments
 (0)