Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/major/cis-rhel-ansible
Ansible playbooks for CIS Benchmarks on RHEL/CentOS 6
https://github.com/major/cis-rhel-ansible
Last synced: 3 months ago
JSON representation
Ansible playbooks for CIS Benchmarks on RHEL/CentOS 6
- Host: GitHub
- URL: https://github.com/major/cis-rhel-ansible
- Owner: major
- License: apache-2.0
- Archived: true
- Created: 2013-10-15T03:22:29.000Z (about 11 years ago)
- Default Branch: master
- Last Pushed: 2019-11-22T17:28:48.000Z (almost 5 years ago)
- Last Synced: 2024-05-29T08:11:10.930Z (6 months ago)
- Size: 576 KB
- Stars: 341
- Watchers: 82
- Forks: 185
- Open Issues: 13
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
## Ansible + CIS Benchmarks + RHEL/CentOS 6
[![Build Status](https://travis-ci.org/major/cis-rhel-ansible.svg?branch=master)](https://travis-ci.org/major/cis-rhel-ansible)
This is an ansible playbook for automatically applying CIS Security Benchmarks to a system running Red Hat Enterprise Linux 6 or CentOS 6.
_RHEL 7 and CentOS 7 bencharks are coming soon._
### What are these benchmarks?
The [Center for Internet Security](http://www.cisecurity.org/) publishes [security benchmarks](http://benchmarks.cisecurity.org/) for various systems. Refer to the CIS site as the authoritative site for anything regarding these benchmarks. You can join their community and contribute to the security benchmarks project.***Please be aware that I'm not affiliated with CIS in any way and the data in this repository has absolutely no relation to CIS.***
### What does this playbook do?
The playbook will attempt to configure your system to meet as many of the CIS security benchmarks as possible. Any benchmarks marked as "not scored" or benchmarks that are only checks will be skipped.For full details and caveats, refer to the [notes](NOTES.md).
### How do I run it?
***WAIT! DANGER!***![http://media.giphy.com/media/7U1XfwZ94okRW/giphy.gif](http://media.giphy.com/media/7U1XfwZ94okRW/giphy.gif)
**Don't run this blindly on an actively running system.** The playbook will make ***serious*** modifications to your system that could affect its availability.
#### Basic operation
Perform a dry run first:
ansible-playbook -i hosts -C playbook.yml
If you're ***really really*** ready to apply changes, run it in regular mode:
ansible-playbook -i hosts playbook.yml
#### Advanced options
Tags are available for running a section at a time:
# Test only items from section 4
ansible-playbook -i hosts -C playbook.yml -t section4
# Apply changes only from items in section 4, 5, and 6
ansible-playbook -i hosts playbook.yml -t section4,section5,section6The checks are also broken up into Level 1 and Level 2 checks:
* Level 1: Good security improvements with less effects on production workloads
* Level 2: Strong security improvements with greater effects on production workloadsRunning checks for a particular level is easy:
ansible-playbook -i hosts playbook.yml -t level1
ansible-playbook -i hosts playbook.yml -t level2### How is this playbook licensed?
It's licensed under the [Apache License 2.0](https://www.apache.org/licenses/LICENSE-2.0.html). The [quick summary](http://bit.ly/VBkBfY) is:A license that allows you much freedom with the software, including an explicit right to a patent. “State changes” means that you have to include a notice in each file you modified.
### Something doesn't work. You're awful at ansible playbooks.
[Pull requests](https://github.com/major/cis-rhel-ansible/pulls) and [GitHub](https://github.com/major/cis-rhel-ansible/issues) issues are welcome!
_-- Major_