Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/redhatofficial/ansible-role-rhel9-pci-dss

PCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 9 - Ansible role generated from ComplianceAsCode Project
https://github.com/redhatofficial/ansible-role-rhel9-pci-dss

Last synced: about 20 hours ago
JSON representation

PCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 9 - Ansible role generated from ComplianceAsCode Project

Awesome Lists containing this project

README

        

PCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 9
=========

Ansible Role for PCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 9

Profile Description:
Payment Card Industry - Data Security Standard (PCI-DSS) is a set of
security standards designed to ensure the secure handling of payment card
data, with the goal of preventing data breaches and protecting sensitive
financial information.
This profile ensures Red Hat Enterprise Linux 9 is configured in alignment
with PCI-DSS v4.0 requirements.

The tasks that are used in this role are generated using OpenSCAP.
See the OpenSCAP project for more details on Ansible playbook generation at [https://github.com/OpenSCAP/openscap](https://github.com/OpenSCAP/openscap)

To submit a fix or enhancement for an Ansible task that is failing or missing in this role,
see the ComplianceAsCode project at [https://github.com/ComplianceAsCode/content](https://github.com/ComplianceAsCode/content)

Requirements
------------

- Ansible version 2.9 or higher

Role Variables
--------------

To customize the role to your liking, check out the [list of variables](defaults/main.yml).

Dependencies
------------

N/A

Example Role Usage
----------------

Run `ansible-galaxy install RedHatOfficial.rhel9_pci_dss` to
download and install the role. Then, you can use the following playbook snippet to run the Ansible role:

- hosts: all
roles:
- { role: RedHatOfficial.rhel9_pci_dss }

Next, check the playbook using (on the localhost) the following example:

ansible-playbook -i "localhost," -c local --check playbook.yml

To deploy it, use (this may change configuration of your local machine!):

ansible-playbook -i "localhost," -c local playbook.yml

License
-------

BSD-3-Clause

Author Information
------------------

This Ansible remediation role has been generated from the body of security
policies developed by the ComplianceAsCode project. Please see
[https://github.com/complianceascode/content/blob/master/Contributors.md](https://github.com/complianceascode/content/blob/master/Contributors.md)
for an updated list of authors and contributors.