You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/compliance-scansetting-cr.adoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -12,5 +12,5 @@ To increase the default CPU and memory limits of the Compliance Operator, see _I
12
12
13
13
[IMPORTANT]
14
14
====
15
-
Increasing the memory limit for the Compliance Operator or the scanner pods is needed if the default limits are not sufficient and the Operator or scanner pods are ended by the Out Of Memory (OOM) process.
15
+
Increasing the memory limit for the Compliance Operator or the scanner pods is needed if the default limits are not sufficient and the Operator or scanner pods are ended by the Out Of Memory (OOM) process. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/security_and_compliance/compliance-operator#compliance-increasing-operator-limits_compliance-troubleshooting[Increasing Compliance Operator resource limits].
1. The `ocp4-cis` and `ocp4-cis-node` profiles maintain the most up-to-date version of the CIS benchmark as it becomes available in the Compliance Operator. If you want to adhere to a specific version, such as CIS v1.4.0, use the `ocp4-cis-1-4` and `ocp4-cis-node-1-4` profiles.
87
109
2. Node profiles must be used with the relevant Platform profile. For more information, see _Compliance Operator profile types_.
88
110
3. CIS v1.4.0 is superceded by CIS v1.5.0. It is recommended to apply the latest profile to your environment.
89
111
4. To locate the CIS {product-title} v4 Benchmark, go to link:https://www.cisecurity.org/benchmark/kubernetes[CIS Benchmarks] and click *Download Latest CIS Benchmark*, where you can then register to download the benchmark.
90
112
113
+
[id="bsi-profiles_{context}"]
114
+
== BSI Profile Support
115
+
116
+
BSI (Bundesamt für Sicherheit in der Informationstechnik, Germany’s Federal Office for Information Security) compliance is legally mandated under Germany’s IT Security Act (IT-Sicherheitsgesetz) for critical infrastructure sectors like energy, healthcare, and telecommunications. With the release of Compliance Operator 1.7.0, BSI compliance checks for Block SYS.1.6 Containerization and Block APP.4.4 Kubernetes are now available. For more information, see link:https://access.redhat.com/articles/7045834[*BSI Quick Check*].
117
+
91
118
[id="e8-profiles_{context}"]
92
119
== Essential Eight compliance profiles
93
120
@@ -200,6 +227,7 @@ The following tables reflect the latest available profiles in the Compliance Ope
200
227
|`x86_64`
201
228
`ppc64le`
202
229
`s390x`
230
+
`aarch64`
203
231
|
204
232
205
233
|ocp4-moderate-node ^[1]^
@@ -209,6 +237,7 @@ The following tables reflect the latest available profiles in the Compliance Ope
209
237
|`x86_64`
210
238
`ppc64le`
211
239
`s390x`
240
+
`aarch64`
212
241
|{product-rosa} with {hcp} (ROSA HCP)
213
242
214
243
|ocp4-moderate-node-rev-4
@@ -218,6 +247,7 @@ The following tables reflect the latest available profiles in the Compliance Ope
218
247
|`x86_64`
219
248
`ppc64le`
220
249
`s390x`
250
+
`aarch64`
221
251
|{product-rosa} with {hcp} (ROSA HCP)
222
252
223
253
|ocp4-moderate-rev-4
@@ -227,20 +257,23 @@ The following tables reflect the latest available profiles in the Compliance Ope
227
257
|`x86_64`
228
258
`ppc64le`
229
259
`s390x`
260
+
`aarch64`
230
261
|
231
262
232
263
|rhcos4-moderate ^[1]^
233
264
|NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS
@@ -306,6 +339,7 @@ The following tables reflect the latest available profiles in the Compliance Ope
306
339
|Platform
307
340
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
308
341
|`x86_64`
342
+
`ppc64le`
309
343
|
310
344
311
345
|ocp4-pci-dss-3-2 ^[3]^
@@ -322,13 +356,15 @@ The following tables reflect the latest available profiles in the Compliance Ope
322
356
|Platform
323
357
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
324
358
|`x86_64`
359
+
`ppc64le`
325
360
|
326
361
327
362
|ocp4-pci-dss-node ^[1]^
328
363
|PCI-DSS v4 Control Baseline for {product-title} 4
329
364
|Node ^[2]^
330
365
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
331
366
|`x86_64`
367
+
`ppc64le`
332
368
|{product-rosa} with {hcp} (ROSA HCP)
333
369
334
370
|ocp4-pci-dss-node-3-2 ^[3]^
@@ -345,8 +381,10 @@ The following tables reflect the latest available profiles in the Compliance Ope
345
381
|Node ^[2]^
346
382
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
347
383
|`x86_64`
384
+
`ppc64le`
348
385
|{product-rosa} with {hcp} (ROSA HCP)
349
386
|===
387
+
350
388
[.small]
351
389
1. The `ocp4-pci-dss` and `ocp4-pci-dss-node` profiles maintain the most up-to-date version of the PCI-DSS standard as it becomes available in the Compliance Operator. If you want to adhere to a specific version, such as PCI-DSS v3.2.1, use the `ocp4-pci-dss-3-2` and `ocp4-pci-dss-node-3-2` profiles.
352
390
2. Node profiles must be used with the relevant Platform profile. For more information, see _Compliance Operator profile types_.
@@ -371,62 +409,95 @@ The following tables reflect the latest available profiles in the Compliance Ope
Copy file name to clipboardExpand all lines: modules/running-compliance-scans.adoc
+5Lines changed: 5 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -13,6 +13,11 @@ You can run a scan using the Center for Internet Security (CIS) profiles. For co
13
13
For all-in-one control plane and worker nodes, the compliance scan runs twice on the worker and control plane nodes. The compliance scan might generate inconsistent scan results. You can avoid inconsistent results by defining only a single role in the `ScanSetting` object.
14
14
====
15
15
16
+
[IMPORTANT]
17
+
====
18
+
Compliance Operator scans report `INCONSISTENT` on clusters with multi-architecture compute machines whether the control plane uses `aarch64` or `x86` CPUs. This is due to the same rule behaving differently on different architectures. This should only be applicable for node scans, where the Compliance Operator aggregates results from multiple nodes into a single result.
19
+
====
20
+
16
21
For more information about inconsistent scan results, see link:https://access.redhat.com/solutions/6970861[Compliance Operator shows INCONSISTENT scan result with worker node].
Copy file name to clipboardExpand all lines: security/compliance_operator/co-management/compliance-operator-installation.adoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ The Compliance Operator might report incorrect results on managed platforms, suc
15
15
16
16
[IMPORTANT]
17
17
====
18
-
Before deploying the Compliance Operator, you are required to define persistent storage in your cluster to store the raw results output. For more information, see xref:../../../storage/understanding-persistent-storage.adoc#persistent-storage-overview_understanding-persistent-storage[Persistant storage overview] and xref:../../../storage/container_storage_interface/persistent-storage-csi-sc-manage.adoc#overview[Managing the default storage class].
18
+
Before deploying the Compliance Operator, you are required to define persistent storage in your cluster to store the raw results output. For more information, see xref:../../../storage/understanding-persistent-storage.adoc#persistent-storage-overview_understanding-persistent-storage[Persistent storage overview] and xref:../../../storage/container_storage_interface/persistent-storage-csi-sc-manage.adoc#overview[Managing the default storage class].
* A `must-gather` extension is now available for the Compliance Operator installed on `aarch64`, `x86`, `ppc64le`, and `s390x` architectures. The `must-gather` tool provides crucial configuration details to Red Hat Customer Support and engineering. For more information, see xref:../../security/compliance_operator/co-support.adoc#compliance-must-gather_co-support[Using the must-gather tool for the Compliance Operator].
32
+
33
+
* CIS Benchmark Support has been added to Compliance Operator 1.7.0. The profile supported is CIS OpenShift Benchmark 1.7.0. For more information, see (link:https://issues.redhat.com/browse/CMP-3081[*CMP-3081*])
34
+
35
+
* Compliance Operator is now supported on `aarch64` architecture for CIS OpenShift Benchmark 1.7.0 and FedRAMP Moderate Revision 4. For more information, see (link:https://issues.redhat.com/browse/CMP-2960[*CMP-2960*])
36
+
37
+
* Compliance Operator 1.7.0 now supports OpenShift DISA STIG V2R2 profiles for OpenShift and RHCOS. For more information, see (link:https://issues.redhat.com/browse/CMP-3142[*CMP-3142*])
38
+
39
+
* Compliance Operator 1.7.0 now supports deprecation of old, unsupported profile versions, such as deprecation of CIS 1.4 profiles, CIS 1.5 profiles, DISA STIG V1R1 profiles and DISA STIG V2R1 profiles. For more information, see (link:https://issues.redhat.com/browse/CMP-3149[*CMP-3149*])
40
+
41
+
* With this release of Compliance Operator 1.7.0, the deprecation of older CIS and DISA STIG profiles mean that these older profiles will no longer be supported with the appearance of Compliance Operator 1.8.0. For more information, see (link:https://issues.redhat.com/browse/CMP-3284[*CMP-3284*])
42
+
43
+
* With this release of Compliance Operator 1.7.0, BSI profile support is added for OpenShift. For more information, refer to the KCS article link:https://access.redhat.com/articles/7045834[*BSI Quick Check*] and link:https://access.redhat.com/compliance/bsi[*BSI Compliance Summary*].
* Before this release, Compliance Operator would provide an unneeded remediation recommendation due to differences in filesystem structure for the `s390x` architecture. With this release, the Compliance Operator now recognizes the differences in filesystem structure and does not provide the misleading remediation. With this update, the rule is now more clearly defined. (link:https://issues.redhat.com/browse/OCPBUGS-33194[*OCPBUGS-33194*])
49
+
50
+
* Previously, the instructions for rule `ocp4-etcd-unique-ca` did not work for OpenShift 4.17 and later. With this update, the instructions and actionable steps are corrected. (link:https://issues.redhat.com/browse/OCPBUGS-42350[*OCPBUGS-42350*])
51
+
52
+
* When using the Compliance Operator with Cluster Logging Operator (CLO) version 6.0, various rules would fail. This is due to backwards incompatible changes to the CRDs that CLO uses. The Compliance Operator relies on those CRDs to verify logging functionality. The CRDs have been corrected to support the PCI-DSS profiles with CLO. (link:https://issues.redhat.com/browse/OCPBUGS-43229[*OCPBUGS-43229*])
53
+
54
+
* After installing Cluster Logging Operator (CLO) 6.0, users found that the ComplianceCheckResult `ocp4-cis-audit-log-forwarding-enabled` was failing because there was a change in the APIversion of the `clusterlogforwarder` resource. Log collection and forwarding configurations are now specified under the new API, part of the observability.openshift.io API group. (link:https://issues.redhat.com/browse/OCPBUGS-43585[*OCPBUGS-43585*])
55
+
56
+
* For previous releases of Compliance Operator, the scans would generate an error log for the reconcile loop on the Operator pod. With this release, the Compliance Operator controller logic is more stable. (link:https://issues.redhat.com/browse/OCPBUGS-51267[*OCPBUGS-51267*])
57
+
58
+
* Previously, the rules `file-integrity-exists` or `file-integrity-notification-enabled` would fail on `aarch64` OpenShift clusters. With this update, these rules evaluate as `NOT-APPLICABLE` on `aarch64` systems. (link:https://issues.redhat.com/browse/OCPBUGS-52884[*OCPBUGS-52884*])
59
+
60
+
* Before this release of the Compliance Operator, the rule `kubelet-configure-tls-cipher-suites` failed for the API server ciphers, resulting in `E2E-FAILURE` status. The rule has been updated to check new ciphers from RFC 8446, which are included with OpenShift 4.18. The rule is now being evaluated correctly. (link:https://issues.redhat.com/browse/OCPBUGS-54212[*OCPBUGS-54212*])
61
+
62
+
* Previously, the Compliance Operator platform scan would fail and produce the message `failed to parse Ignition config`. With this release, the Compliance Operator is safe to run on 4.19 clusters, when that version of OpenShift is available to customers. (link:https://issues.redhat.com/browse/OCPBUGS-54403[*OCPBUGS-54403*])
63
+
64
+
* Before this release of Compliance Operator, several rules were not platform aware, creating unneeded errors. Now that the rules have been properly ported to other architectures, those rules run correctly and users can observe some Compliance Check Results reporting `NOT-APPLICABLE` appropriately, depending on the architecture they are using. (link:https://issues.redhat.com/browse/OCPBUGS-53041[*OCPBUGS-53041*])
65
+
66
+
* Previously, the rule `file-groupowner-ovs-conf-db-hugetlbf` would fail unexpectedly. With this release, the rule fails only when this is the needed result. (link:http://issues.redhat.com/browse/OCPBUGS-55180[*OCPBUGS-55190*])
0 commit comments