Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/redhatofficial/ansible-role-rhel7-stig
DISA STIG for Red Hat Enterprise Linux 7 - Ansible role generated from ComplianceAsCode Project
https://github.com/redhatofficial/ansible-role-rhel7-stig
Last synced: about 21 hours ago
JSON representation
DISA STIG for Red Hat Enterprise Linux 7 - Ansible role generated from ComplianceAsCode Project
- Host: GitHub
- URL: https://github.com/redhatofficial/ansible-role-rhel7-stig
- Owner: RedHatOfficial
- License: other
- Created: 2018-06-04T18:04:40.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2024-02-22T23:45:38.000Z (9 months ago)
- Last Synced: 2024-04-20T19:43:25.116Z (7 months ago)
- Homepage: https://github.com/complianceascode/content
- Size: 526 KB
- Stars: 118
- Watchers: 28
- Forks: 72
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
DISA STIG for Red Hat Enterprise Linux 7
=========Ansible Role for DISA STIG for Red Hat Enterprise Linux 7
Profile Description:
This profile contains configuration checks that align to the
DISA STIG for Red Hat Enterprise Linux V3R14.
In addition to being applicable to Red Hat Enterprise Linux 7, DISA recognizes this
configuration baseline as applicable to the operating system tier of
Red Hat technologies that are based on Red Hat Enterprise Linux 7, such as:
- Red Hat Enterprise Linux Server
- Red Hat Enterprise Linux Workstation and Desktop
- Red Hat Enterprise Linux for HPC
- Red Hat Storage
- Red Hat Containers with a Red Hat Enterprise Linux 7 imageThe tasks that are used in this role are generated using OpenSCAP.
See the OpenSCAP project for more details on Ansible playbook generation at [https://github.com/OpenSCAP/openscap](https://github.com/OpenSCAP/openscap)To submit a fix or enhancement for an Ansible task that is failing or missing in this role,
see the ComplianceAsCode project at [https://github.com/ComplianceAsCode/content](https://github.com/ComplianceAsCode/content)Requirements
------------- Ansible version 2.9 or higher
Role Variables
--------------To customize the role to your liking, check out the [list of variables](defaults/main.yml).
Dependencies
------------N/A
Example Role Usage
----------------Run `ansible-galaxy install RedHatOfficial.rhel7_stig` to
download and install the role. Then, you can use the following playbook snippet to run the Ansible role:- hosts: all
roles:
- { role: RedHatOfficial.rhel7_stig }Next, check the playbook using (on the localhost) the following example:
ansible-playbook -i "localhost," -c local --check playbook.yml
To deploy it, use (this may change configuration of your local machine!):
ansible-playbook -i "localhost," -c local playbook.yml
License
-------BSD-3-Clause
Author Information
------------------This Ansible remediation role has been generated from the body of security
policies developed by the ComplianceAsCode project. Please see
[https://github.com/complianceascode/content/blob/master/Contributors.md](https://github.com/complianceascode/content/blob/master/Contributors.md)
for an updated list of authors and contributors.