Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[enterprise-4.14] CMP-2583: Update CO supported profiles to include supported platforms #77182

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
25 changes: 23 additions & 2 deletions modules/compliance-supported-profiles.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
The Compliance Operator provides the following compliance profiles:

.Supported compliance profiles
[cols="10%,40%,10%,10%,40%,10%", options="header"]
[cols="10%,40%,10%,10%,40%,10%,40%", options="header"]

|===
|Profile
Expand All @@ -18,27 +18,31 @@ The Compliance Operator provides the following compliance profiles:
|Compliance Operator version
|Industry compliance benchmark
|Supported architectures
|Supported platforms

|rhcos4-stig
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift
|Node
|1.3.0+
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG] ^[1]^
|`x86_64`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+

|ocp4-stig-node
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift
|Node
|1.3.0+
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG] ^[1]^
|`x86_64`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+

|ocp4-stig
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift
|Platform
|1.3.0+
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG] ^[1]^
|`x86_64`
|

|ocp4-cis-1-4
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.4.0
Expand All @@ -48,6 +52,7 @@ The Compliance Operator provides the following compliance profiles:
|`x86_64`
`ppc64le`
`s390x`
|

|ocp4-cis-node-1-4
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.4.0
Expand All @@ -57,6 +62,7 @@ The Compliance Operator provides the following compliance profiles:
|`x86_64`
`ppc64le`
`s390x`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+

|ocp4-cis
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.5.0
Expand All @@ -66,6 +72,7 @@ The Compliance Operator provides the following compliance profiles:
|`x86_64`
`ppc64le`
`s390x`
|

|ocp4-cis-node
|CIS Red Hat OpenShift Container Platform 4 Benchmark v1.5.0
Expand All @@ -75,13 +82,15 @@ The Compliance Operator provides the following compliance profiles:
|`x86_64`
`ppc64le`
`s390x`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+

|ocp4-e8
|Australian Cyber Security Centre (ACSC) Essential Eight
|Platform
|0.1.39+
|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers]
|`x86_64`
|

|ocp4-moderate
|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Platform level
Expand All @@ -91,20 +100,23 @@ The Compliance Operator provides the following compliance profiles:
|`x86_64`
`ppc64le`
`s390x`
|

|rhcos4-e8
|Australian Cyber Security Centre (ACSC) Essential Eight
|Node
|0.1.39+
|link:https://www.cyber.gov.au/acsc/view-all-content/publications/hardening-linux-workstations-and-servers[ACSC Hardening Linux Workstations and Servers]
|`x86_64`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+

|rhcos4-moderate
|NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS
|Node
|0.1.39+
|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
|`x86_64`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+

|ocp4-moderate-node
|NIST 800-53 Moderate-Impact Baseline for Red Hat OpenShift - Node level
Expand All @@ -114,27 +126,31 @@ The Compliance Operator provides the following compliance profiles:
|`x86_64`
`ppc64le`
`s390x`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+

|ocp4-nerc-cip
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Platform level
|Platform
|0.1.44+
|link:https://www.nerc.com/pa/Stand/Pages/USRelStand.aspx[NERC CIP Standards]
|`x86_64`
|

|ocp4-nerc-cip-node
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for the Red Hat OpenShift Container Platform - Node level
|Node ^[2]^
|0.1.44+
|link:https://www.nerc.com/pa/Stand/Pages/USRelStand.aspx[NERC CIP Standards]
|`x86_64`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+

|rhcos4-nerc-cip
|North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) cybersecurity standards profile for Red Hat Enterprise Linux CoreOS
|Node
|0.1.44+
|link:https://www.nerc.com/pa/Stand/Pages/USRelStand.aspx[NERC CIP Standards]
|`x86_64`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+

|ocp4-pci-dss
|PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4
Expand All @@ -143,6 +159,7 @@ The Compliance Operator provides the following compliance profiles:
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
|`x86_64`
`ppc64le`
|

|ocp4-pci-dss-node
|PCI-DSS v3.2.1 Control Baseline for Red Hat OpenShift Container Platform 4
Expand All @@ -151,27 +168,31 @@ The Compliance Operator provides the following compliance profiles:
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
|`x86_64`
`ppc64le`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+

|ocp4-high
|NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Platform level
|Platform
|0.1.52+
|link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
|`x86_64`
|

|ocp4-high-node
|NIST 800-53 High-Impact Baseline for Red Hat OpenShift - Node level
|Node ^[2]^
|0.1.52+
|link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
|`x86_64`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+

|rhcos4-high
|NIST 800-53 High-Impact Baseline for Red Hat Enterprise Linux CoreOS
|Node
|0.1.52+
|link:https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search#!/800-53[NIST SP-800-53 Release Search]
|`x86_64`
|Red Hat OpenShift Service on AWS with hosted control planes (ROSA HCP) - requires 1.5.0+
|===
[.small]
1. To locate the CIS {product-title} v4 Benchmark, go to link:https://www.cisecurity.org/benchmark/kubernetes[CIS Benchmarks] and click *Download Latest CIS Benchmark*, where you can then register to download the benchmark.
Expand Down Expand Up @@ -214,4 +235,4 @@ For example, the NIST High-Impact and Moderate-Impact profiles extend the CIS pr

|ocp4-nerc-cip-node
|ocp4-moderate-node
|===
|===
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ authorized auditor to achieve compliance with a standard.

[IMPORTANT]
====
The Compliance Operator might report incorrect results on managed platforms, such as OpenShift Dedicated, Red Hat OpenShift Service on AWS, and Azure Red Hat OpenShift. For more information, see the link:https://access.redhat.com/solutions/6983418[Red Hat Knowledgebase Solution #6983418].
The Compliance Operator might report incorrect results on some managed platforms, such as OpenShift Dedicated and Azure Red Hat OpenShift. For more information, see the link:https://access.redhat.com/solutions/6983418[Red Hat Knowledgebase Solution #6983418].
====

include::modules/compliance-supported-profiles.adoc[leveloffset=+1]
Expand Down