Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/redhatofficial/ansible-role-rhel8-cis
CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Server - Ansible role generated from ComplianceAsCode Project
https://github.com/redhatofficial/ansible-role-rhel8-cis
Last synced: about 21 hours ago
JSON representation
CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Server - Ansible role generated from ComplianceAsCode Project
- Host: GitHub
- URL: https://github.com/redhatofficial/ansible-role-rhel8-cis
- Owner: RedHatOfficial
- License: other
- Created: 2021-06-16T20:04:37.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2024-02-22T23:53:01.000Z (9 months ago)
- Last Synced: 2024-04-20T19:43:25.563Z (7 months ago)
- Homepage: https://github.com/complianceascode/content
- Size: 732 KB
- Stars: 43
- Watchers: 13
- Forks: 24
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Server
=========Ansible Role for CIS Red Hat Enterprise Linux 8 Benchmark for Level 2 - Server
Profile Description:
This profile defines a baseline that aligns to the "Level 2 - Server"
configuration from the Center for Internet Security® Red Hat Enterprise
Linux 8 Benchmark™, v3.0.0, released 2023-10-30.
This profile includes Center for Internet Security®
Red Hat Enterprise Linux 8 CIS Benchmarks™ content.The tasks that are used in this role are generated using OpenSCAP.
See the OpenSCAP project for more details on Ansible playbook generation at [https://github.com/OpenSCAP/openscap](https://github.com/OpenSCAP/openscap)To submit a fix or enhancement for an Ansible task that is failing or missing in this role,
see the ComplianceAsCode project at [https://github.com/ComplianceAsCode/content](https://github.com/ComplianceAsCode/content)Requirements
------------- Ansible version 2.9 or higher
Role Variables
--------------To customize the role to your liking, check out the [list of variables](defaults/main.yml).
Dependencies
------------N/A
Example Role Usage
----------------Run `ansible-galaxy install RedHatOfficial.rhel8_cis` to
download and install the role. Then, you can use the following playbook snippet to run the Ansible role:- hosts: all
roles:
- { role: RedHatOfficial.rhel8_cis }Next, check the playbook using (on the localhost) the following example:
ansible-playbook -i "localhost," -c local --check playbook.yml
To deploy it, use (this may change configuration of your local machine!):
ansible-playbook -i "localhost," -c local playbook.yml
License
-------BSD-3-Clause
Author Information
------------------This Ansible remediation role has been generated from the body of security
policies developed by the ComplianceAsCode project. Please see
[https://github.com/complianceascode/content/blob/master/Contributors.md](https://github.com/complianceascode/content/blob/master/Contributors.md)
for an updated list of authors and contributors.