CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Server ========= Ansible Role for CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Server Profile Description: This profile defines a baseline that aligns to the "Level 2 - Server" configuration from the Center for Internet Security® Red Hat Enterprise Linux 9 Benchmark™, v2.0.0, released 2024-06-20. This profile includes Center for Internet Security® Red Hat Enterprise Linux 9 CIS Benchmarks™ content. The tasks that are used in this role are generated using OpenSCAP. See the OpenSCAP project for more details on Ansible playbook generation at [https://github.com/OpenSCAP/openscap](https://github.com/OpenSCAP/openscap) To submit a fix or enhancement for an Ansible task that is failing or missing in this role, see the ComplianceAsCode project at [https://github.com/ComplianceAsCode/content](https://github.com/ComplianceAsCode/content) Requirements ------------ - Ansible version 2.9 or higher Role Variables -------------- To customize the role to your liking, check out the [list of variables](defaults/main.yml). Dependencies ------------ N/A Example Role Usage ---------------- Run `ansible-galaxy install RedHatOfficial.rhel9_cis` to download and install the role. Then, you can use the following playbook snippet to run the Ansible role: - hosts: all roles: - { role: RedHatOfficial.rhel9_cis } Next, check the playbook using (on the localhost) the following example: ansible-playbook -i "localhost," -c local --check playbook.yml To deploy it, use (this may change configuration of your local machine!): ansible-playbook -i "localhost," -c local playbook.yml License ------- BSD-3-Clause Author Information ------------------ This Ansible remediation role has been generated from the body of security policies developed by the ComplianceAsCode project. Please see [https://github.com/complianceascode/content/blob/master/Contributors.md](https://github.com/complianceascode/content/blob/master/Contributors.md) for an updated list of authors and contributors.