Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/redhatofficial/ansible-role-rhel8-cjis

Criminal Justice Information Services (CJIS) Security Policy - Ansible role generated from ComplianceAsCode Project
https://github.com/redhatofficial/ansible-role-rhel8-cjis

Last synced: about 21 hours ago
JSON representation

Criminal Justice Information Services (CJIS) Security Policy - Ansible role generated from ComplianceAsCode Project

Awesome Lists containing this project

README

        

Criminal Justice Information Services (CJIS) Security Policy
=========

Ansible Role for Criminal Justice Information Services (CJIS) Security Policy

Profile Description:
This profile is derived from FBI's CJIS v5.4
Security Policy. A copy of this policy can be found at the CJIS Security
Policy Resource Center:
https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center

The tasks that are used in this role are generated using OpenSCAP.
See the OpenSCAP project for more details on Ansible playbook generation at [https://github.com/OpenSCAP/openscap](https://github.com/OpenSCAP/openscap)

To submit a fix or enhancement for an Ansible task that is failing or missing in this role,
see the ComplianceAsCode project at [https://github.com/ComplianceAsCode/content](https://github.com/ComplianceAsCode/content)

Requirements
------------

- Ansible version 2.9 or higher

Role Variables
--------------

To customize the role to your liking, check out the [list of variables](defaults/main.yml).

Dependencies
------------

N/A

Example Role Usage
----------------

Run `ansible-galaxy install RedHatOfficial.rhel8_cjis` to
download and install the role. Then, you can use the following playbook snippet to run the Ansible role:

- hosts: all
roles:
- { role: RedHatOfficial.rhel8_cjis }

Next, check the playbook using (on the localhost) the following example:

ansible-playbook -i "localhost," -c local --check playbook.yml

To deploy it, use (this may change configuration of your local machine!):

ansible-playbook -i "localhost," -c local playbook.yml

License
-------

BSD-3-Clause

Author Information
------------------

This Ansible remediation role has been generated from the body of security
policies developed by the ComplianceAsCode project. Please see
[https://github.com/complianceascode/content/blob/master/Contributors.md](https://github.com/complianceascode/content/blob/master/Contributors.md)
for an updated list of authors and contributors.