ComplianceAsCode development team a8b701413f Updated defaults/main.yml
2022-12-20 20:27:02 -05:00
2022-12-20 20:27:02 -05:00
2022-10-05 23:53:13 -04:00
2022-10-05 23:55:37 -04:00
2022-10-05 23:55:39 -04:00
2022-10-05 23:53:13 -04:00
2022-10-05 23:55:40 -04:00
2022-10-05 23:55:40 -04:00

DRAFT CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Server

Ansible Role for DRAFT CIS Red Hat Enterprise Linux 9 Benchmark for Level 2 - Server

Profile Description:
This is a draft profile based on its RHEL8 version for experimental purposes.
It is not based on the CIS benchmark for RHEL9, because this one was not available at time of
the release.

The tasks that are used in this role are generated using OpenSCAP. See the OpenSCAP project for more details on Ansible playbook generation at https://github.com/OpenSCAP/openscap

To submit a fix or enhancement for an Ansible task that is failing or missing in this role, see the ComplianceAsCode project at https://github.com/ComplianceAsCode/content

Requirements

  • Ansible version 2.9 or higher

Role Variables

To customize the role to your liking, check out the list of variables.

Dependencies

N/A

Example Role Usage

Run ansible-galaxy install RedHatOfficial.rhel9_cis to download and install the role. Then, you can use the following playbook snippet to run the Ansible role:

- hosts: all
  roles:
     - { role: RedHatOfficial.rhel9_cis }

Next, check the playbook using (on the localhost) the following example:

ansible-playbook -i "localhost," -c local --check playbook.yml

To deploy it, use (this may change configuration of your local machine!):

ansible-playbook -i "localhost," -c local playbook.yml

License

BSD-3-Clause

Author Information

This Ansible remediation role has been generated from the body of security policies developed by the ComplianceAsCode project. Please see https://github.com/complianceascode/content/blob/master/Contributors.md for an updated list of authors and contributors.

Description
CIS Red Hat Enterprise Linux
Readme BSD-3-Clause 852 KiB