Skip to content

Commit 635956c

Browse files
Fix issues reported by asciidoctor-dita-vale (Managing Security Compliance) (#4201)
* Convert xrefs * Fix additional resources * Turn compliance deployment into an assembly * Turn listing scap contents into separate modules * Turn reference to a job template into a note * Address more complex block titles * Turn uploading additional scap content into separate modules * Turn manual compliance policy section into concept --------- Co-authored-by: Maximilian Kolb <[email protected]>
1 parent 4143496 commit 635956c

26 files changed

+165
-119
lines changed
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
3+
include::modules/con_configuring-compliance-policy-deployment-methods.adoc[]
4+
5+
include::modules/proc_configuring-project-for-ansible-compliance-policy-deployment.adoc[leveloffset=+1]
6+
7+
include::modules/proc_configuring-project-for-puppet-compliance-policy-deployment.adoc[leveloffset=+1]
8+
9+
include::modules/con_configuring-project-for-manual-compliance-policy-deployment.adoc[leveloffset=+1]

guides/common/assembly_configuring-scap-contents.adoc

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,9 @@ ifndef::satellite[]
88
include::modules/proc_getting-scap-contents-from-upstream.adoc[leveloffset=+1]
99
endif::[]
1010

11-
include::modules/proc_uploading-additional-scap-content.adoc[leveloffset=+1]
11+
include::modules/proc_uploading-additional-scap-content-using-web-ui.adoc[leveloffset=+1]
12+
13+
include::modules/proc_uploading-additional-scap-content-using-cli.adoc[leveloffset=+1]
1214

1315
include::modules/con_tailoring-xccdf-profiles.adoc[leveloffset=+1]
1416

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
:_mod-docs-content-type: CONCEPT
2+
3+
[id="configuring-compliance-policy-deployment-methods_{context}"]
4+
= Configuring compliance policy deployment methods
5+
6+
Use one the following procedures to configure {Project} for the method that you have selected to deploy compliance policies.
7+
You will select one of these methods when you later xref:common/modules/proc_creating-a-compliance-policy.adoc#Creating_a_Compliance_Policy_{context}[create a compliance policy].
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
:_mod-docs-content-type: CONCEPT
2+
3+
[id="configuring-{project-context}-for-manual-compliance-policy-deployment"]
4+
= Configuring {Project} for manual compliance policy deployment
5+
6+
For the manual deployment method, no additional {Project} configuration is required.
7+
8+
ifdef::satellite[]
9+
.Additional resources
10+
* https://access.redhat.com/solutions/6389101[How to set up OpenSCAP Policies using Manual Deployment option in the _Red{nbsp}Hat Knowledgebase_]
11+
endif::[]

guides/common/modules/con_scap-content-in-project.adoc

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,3 @@ You can adapt existing XCCDF profiles according to your requirements by using _t
1010

1111
In {Project}, you use an XCCDF profile from SCAP content and, eventually, a tailoring file, to define a _compliance policy_.
1212
{Project} includes default SCAP contents from SCAP Security Guide provided by the https://www.open-scap.org/[OpenSCAP project].
13-
14-
ifndef::orcharhino[]
15-
.Additional resources
16-
* {RHELDocsBaseURL}10/html/security_hardening/[_{RHEL}{nbsp}10 Security hardening_]
17-
* {RHELDocsBaseURL}9/html/security_hardening/[_{RHEL}{nbsp}9 Security hardening_]
18-
* {RHELDocsBaseURL}8/html/security_hardening/[_{RHEL}{nbsp}8 Security hardening_]
19-
* {RHELDocsBaseURL}7/html/security_guide/[_{RHEL}{nbsp}7 Security Guide_]
20-
endif::[]

guides/common/modules/con_security-content-automation-protocol.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,4 +30,4 @@ The OpenSCAP scanner tool evaluates system items on a host against the rules and
3030
|===
3131

3232
.Additional resources
33-
* For more information about SCAP, see the https://www.open-scap.org/[OpenSCAP project].
33+
* https://www.open-scap.org/[OpenSCAP project]

guides/common/modules/proc_applying-remote-scap-resources-in-a-disconnected-environment.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ If your hosts do not have internet access, you must download remote SCAP resourc
99
.Prerequisites
1010
* You have registered your host to {Project} with remote execution enabled.
1111
* Fetching remote resources must be disabled, which is the default.
12-
For more information, see xref:inclusion-of-remote-scap-resources_{context}[].
12+
For more information, see xref:common/modules/ref_inclusion-of-remote-scap-resources.adoc#inclusion-of-remote-scap-resources_{context}[].
1313

1414
.Procedure
1515
. On your {ProjectServer}, examine the data stream you use in your compliance policy to find out which missing resource you must download:

guides/common/modules/proc_configuring-compliance-policy-deployment-methods.adoc

Lines changed: 0 additions & 34 deletions
This file was deleted.
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
:_mod-docs-content-type: PROCEDURE
2+
3+
[id="configuring-{project-context}-for-ansible-compliance-policy-deployment"]
4+
= Configuring {Project} for Ansible compliance policy deployment
5+
6+
If you want to use Ansible to deploy compliance policies, configure {Project} for Ansible compliance policy deployment.
7+
8+
.Procedure
9+
. Import the `theforeman.foreman_scap_client` Ansible role.
10+
+
11+
For more information, see {ManagingConfigurationsAnsibleDocURL}[_{ManagingConfigurationsAnsibleDocTitle}_].
12+
. Assign the created policy and the `theforeman.foreman_scap_client` Ansible role to a host or host group.
13+
. To trigger the deployment, run the Ansible role on the host or host group either manually, or set up a recurring job by using remote execution for regular policy updates.
14+
+
15+
For more information, see {ManagingHostsDocURL}Configuring_and_Setting_Up_Remote_Jobs_managing-hosts[Configuring and Setting Up Remote Jobs] in _{ManagingHostsDocTitle}_.
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
:_mod-docs-content-type: PROCEDURE
2+
3+
[id="configuring-{project-context}-for-puppet-compliance-policy-deployment"]
4+
= Configuring {Project} for Puppet compliance policy deployment
5+
6+
If you want to use Puppet to deploy compliance policies, configure {Project} for Puppet compliance policy deployment.
7+
8+
.Procedure
9+
. Ensure Puppet is enabled.
10+
. Ensure the Puppet agent is installed on hosts.
11+
. Import the Puppet environment that contains the `foreman_scap_client` Puppet module.
12+
+
13+
For more information, see {ManagingConfigurationsPuppetDocURL}[_{ManagingConfigurationsPuppetDocTitle}_].
14+
. Assign the created policy and the `foreman_scap_client` Puppet class to a host or host group.
15+
+
16+
Puppet triggers the deployment on the next regular run or you can run Puppet manually.
17+
Puppet runs every 30 minutes by default.

0 commit comments

Comments
 (0)