Skip to content

Commit 9a721ce

Browse files
authored
Merge pull request #92420 from GroceryBoyJr/OSDOCS-13641
OSDOCS-13641: Compliance Operator 1.7.0 release notes
2 parents 40ca07e + eaac650 commit 9a721ce

File tree

5 files changed

+128
-4
lines changed

5 files changed

+128
-4
lines changed

modules/compliance-scansetting-cr.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,5 +12,5 @@ To increase the default CPU and memory limits of the Compliance Operator, see _I
1212

1313
[IMPORTANT]
1414
====
15-
Increasing the memory limit for the Compliance Operator or the scanner pods is needed if the default limits are not sufficient and the Operator or scanner pods are ended by the Out Of Memory (OOM) process.
15+
Increasing the memory limit for the Compliance Operator or the scanner pods is needed if the default limits are not sufficient and the Operator or scanner pods are ended by the Out Of Memory (OOM) process. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/security_and_compliance/compliance-operator#compliance-increasing-operator-limits_compliance-troubleshooting[Increasing Compliance Operator resource limits].
1616
====

modules/compliance-supported-profiles.adoc

Lines changed: 73 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,13 @@ The following tables reflect the latest available profiles in the Compliance Ope
2828
|Supported platforms
2929

3030
|ocp4-cis ^[1]^
31-
|CIS Red Hat OpenShift Container Platform Benchmark v1.5.0
31+
|CIS Red Hat OpenShift Container Platform Benchmark v1.7.0
3232
|Platform
3333
|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] ^[1]^
3434
|`x86_64`
3535
`ppc64le`
3636
`s390x`
37+
`aarch64`
3738
|
3839

3940
|ocp4-cis-1-4 ^[3]^
@@ -54,13 +55,24 @@ The following tables reflect the latest available profiles in the Compliance Ope
5455
`s390x`
5556
|
5657

58+
|ocp4-cis-1-7
59+
|CIS Red Hat OpenShift Container Platform Benchmark v1.7.0
60+
|Platform
61+
|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] ^[4]^
62+
|`x86_64`
63+
`ppc64le`
64+
`s390x`
65+
`aarch64`
66+
|
67+
5768
|ocp4-cis-node ^[1]^
58-
|CIS Red Hat OpenShift Container Platform Benchmark v1.5.0
69+
|CIS Red Hat OpenShift Container Platform Benchmark v1.7.0
5970
|Node ^[2]^
6071
|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] ^[4]^
6172
|`x86_64`
6273
`ppc64le`
6374
`s390x`
75+
`aarch64`
6476
|{product-rosa} with {hcp} (ROSA HCP)
6577

6678
|ocp4-cis-node-1-4 ^[3]^
@@ -81,13 +93,28 @@ The following tables reflect the latest available profiles in the Compliance Ope
8193
`s390x`
8294
|{product-rosa} with {hcp} (ROSA HCP)
8395

96+
|ocp4-cis-node-1-7
97+
|CIS Red Hat OpenShift Container Platform Benchmark v1.7.0
98+
|Node ^[2]^
99+
|link:https://www.cisecurity.org/cis-benchmarks/[CIS Benchmarks ™] ^[4]^
100+
|`x86_64`
101+
`ppc64le`
102+
`s390x`
103+
`aarch64`
104+
|{product-rosa} with {hcp} (ROSA HCP)
105+
84106
|===
85107
[.small]
86108
1. The `ocp4-cis` and `ocp4-cis-node` profiles maintain the most up-to-date version of the CIS benchmark as it becomes available in the Compliance Operator. If you want to adhere to a specific version, such as CIS v1.4.0, use the `ocp4-cis-1-4` and `ocp4-cis-node-1-4` profiles.
87109
2. Node profiles must be used with the relevant Platform profile. For more information, see _Compliance Operator profile types_.
88110
3. CIS v1.4.0 is superceded by CIS v1.5.0. It is recommended to apply the latest profile to your environment.
89111
4. To locate the CIS {product-title} v4 Benchmark, go to link:https://www.cisecurity.org/benchmark/kubernetes[CIS Benchmarks] and click *Download Latest CIS Benchmark*, where you can then register to download the benchmark.
90112

113+
[id="bsi-profiles_{context}"]
114+
== BSI Profile Support
115+
116+
BSI (Bundesamt für Sicherheit in der Informationstechnik, Germany’s Federal Office for Information Security) compliance is legally mandated under Germany’s IT Security Act (IT-Sicherheitsgesetz) for critical infrastructure sectors like energy, healthcare, and telecommunications. With the release of Compliance Operator 1.7.0, BSI compliance checks for Block SYS.1.6 Containerization and Block APP.4.4 Kubernetes are now available. For more information, see link:https://access.redhat.com/articles/7045834[*BSI Quick Check*].
117+
91118
[id="e8-profiles_{context}"]
92119
== Essential Eight compliance profiles
93120

@@ -200,6 +227,7 @@ The following tables reflect the latest available profiles in the Compliance Ope
200227
|`x86_64`
201228
`ppc64le`
202229
`s390x`
230+
`aarch64`
203231
|
204232

205233
|ocp4-moderate-node ^[1]^
@@ -209,6 +237,7 @@ The following tables reflect the latest available profiles in the Compliance Ope
209237
|`x86_64`
210238
`ppc64le`
211239
`s390x`
240+
`aarch64`
212241
|{product-rosa} with {hcp} (ROSA HCP)
213242

214243
|ocp4-moderate-node-rev-4
@@ -218,6 +247,7 @@ The following tables reflect the latest available profiles in the Compliance Ope
218247
|`x86_64`
219248
`ppc64le`
220249
`s390x`
250+
`aarch64`
221251
|{product-rosa} with {hcp} (ROSA HCP)
222252

223253
|ocp4-moderate-rev-4
@@ -227,20 +257,23 @@ The following tables reflect the latest available profiles in the Compliance Ope
227257
|`x86_64`
228258
`ppc64le`
229259
`s390x`
260+
`aarch64`
230261
|
231262

232263
|rhcos4-moderate ^[1]^
233264
|NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS
234265
|Node
235266
|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
236267
|`x86_64`
268+
`aarch64`
237269
|{product-rosa} with {hcp} (ROSA HCP)
238270

239271
|rhcos4-moderate-rev-4
240272
|NIST 800-53 Moderate-Impact Baseline for Red Hat Enterprise Linux CoreOS
241273
|Node
242274
|link:https://nvd.nist.gov/800-53/Rev4/impact/moderate[NIST SP-800-53 Release Search]
243275
|`x86_64`
276+
`aarch64`
244277
|{product-rosa} with {hcp} (ROSA HCP)
245278

246279
|===
@@ -306,6 +339,7 @@ The following tables reflect the latest available profiles in the Compliance Ope
306339
|Platform
307340
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
308341
|`x86_64`
342+
`ppc64le`
309343
|
310344

311345
|ocp4-pci-dss-3-2 ^[3]^
@@ -322,13 +356,15 @@ The following tables reflect the latest available profiles in the Compliance Ope
322356
|Platform
323357
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
324358
|`x86_64`
359+
`ppc64le`
325360
|
326361

327362
|ocp4-pci-dss-node ^[1]^
328363
|PCI-DSS v4 Control Baseline for {product-title} 4
329364
|Node ^[2]^
330365
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
331366
|`x86_64`
367+
`ppc64le`
332368
|{product-rosa} with {hcp} (ROSA HCP)
333369

334370
|ocp4-pci-dss-node-3-2 ^[3]^
@@ -345,8 +381,10 @@ The following tables reflect the latest available profiles in the Compliance Ope
345381
|Node ^[2]^
346382
|link:https://www.pcisecuritystandards.org/document_library?document=pci_dss[PCI Security Standards ® Council Document Library]
347383
|`x86_64`
384+
`ppc64le`
348385
|{product-rosa} with {hcp} (ROSA HCP)
349386
|===
387+
350388
[.small]
351389
1. The `ocp4-pci-dss` and `ocp4-pci-dss-node` profiles maintain the most up-to-date version of the PCI-DSS standard as it becomes available in the Compliance Operator. If you want to adhere to a specific version, such as PCI-DSS v3.2.1, use the `ocp4-pci-dss-3-2` and `ocp4-pci-dss-node-3-2` profiles.
352390
2. Node profiles must be used with the relevant Platform profile. For more information, see _Compliance Operator profile types_.
@@ -371,62 +409,95 @@ The following tables reflect the latest available profiles in the Compliance Ope
371409
|Platform
372410
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG]
373411
|`x86_64`
412+
`ppc64le`
374413
|
375414

376415
|ocp4-stig-node ^[1]^
377416
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift
378417
|Node ^[2]^
379418
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG]
380419
|`x86_64`
420+
`ppc64le`
381421
|{product-rosa} with {hcp} (ROSA HCP)
382422

383423
|ocp4-stig-node-v1r1 ^[3]^
384424
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift V1R1
385425
|Node ^[2]^
386426
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG]
387427
|`x86_64`
428+
`ppc64le`
388429
|{product-rosa} with {hcp} (ROSA HCP)
389430

390431
|ocp4-stig-node-v2r1
391432
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift V2R1
392433
|Node ^[2]^
393434
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG]
394435
|`x86_64`
436+
`ppc64le`
437+
|{product-rosa} with {hcp} (ROSA HCP)
438+
439+
|ocp4-stig-node-v2r2
440+
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift V2R2
441+
|Node ^[2]^
442+
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG]
443+
|`x86_64`
444+
`ppc64le`
395445
|{product-rosa} with {hcp} (ROSA HCP)
396446

397447
|ocp4-stig-v1r1 ^[3]^
398448
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift V1R1
399449
|Platform
400450
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG]
401451
|`x86_64`
452+
`ppc64le`
402453
|
403454

404455
|ocp4-stig-v2r1
405456
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift V2R1
406457
|Platform
407458
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG]
408459
|`x86_64`
460+
`ppc64le`
461+
|
462+
463+
|ocp4-stig-v2r2
464+
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift V2R2
465+
|Platform
466+
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG]
467+
|`x86_64`
468+
`ppc64le`
409469
|
410470

411471
|rhcos4-stig
412472
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift
413473
|Node
414474
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG]
415475
|`x86_64`
476+
`ppc64le`
416477
|{product-rosa} with {hcp} (ROSA HCP)
417478

418479
|rhcos4-stig-v1r1 ^[3]^
419480
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift V1R1
420481
|Node
421482
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG] ^[3]^
422483
|`x86_64`
484+
`ppc64le`
423485
|{product-rosa} with {hcp} (ROSA HCP)
424486

425487
|rhcos4-stig-v2r1
426488
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift V2R1
427489
|Node
428490
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG]
429491
|`x86_64`
492+
`ppc64le`
493+
|{product-rosa} with {hcp} (ROSA HCP)
494+
495+
|rhcos4-stig-v2r2
496+
|Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) for Red Hat Openshift V2R2
497+
|Node
498+
|link:https://public.cyber.mil/stigs/downloads/[DISA-STIG]
499+
|`x86_64`
500+
`ppc64le`
430501
|{product-rosa} with {hcp} (ROSA HCP)
431502

432503
|===

modules/running-compliance-scans.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,11 @@ You can run a scan using the Center for Internet Security (CIS) profiles. For co
1313
For all-in-one control plane and worker nodes, the compliance scan runs twice on the worker and control plane nodes. The compliance scan might generate inconsistent scan results. You can avoid inconsistent results by defining only a single role in the `ScanSetting` object.
1414
====
1515

16+
[IMPORTANT]
17+
====
18+
Compliance Operator scans report `INCONSISTENT` on clusters with multi-architecture compute machines whether the control plane uses `aarch64` or `x86` CPUs. This is due to the same rule behaving differently on different architectures. This should only be applicable for node scans, where the Compliance Operator aggregates results from multiple nodes into a single result.
19+
====
20+
1621
For more information about inconsistent scan results, see link:https://access.redhat.com/solutions/6970861[Compliance Operator shows INCONSISTENT scan result with worker node].
1722

1823
.Procedure

security/compliance_operator/co-management/compliance-operator-installation.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ The Compliance Operator might report incorrect results on managed platforms, suc
1515

1616
[IMPORTANT]
1717
====
18-
Before deploying the Compliance Operator, you are required to define persistent storage in your cluster to store the raw results output. For more information, see xref:../../../storage/understanding-persistent-storage.adoc#persistent-storage-overview_understanding-persistent-storage[Persistant storage overview] and xref:../../../storage/container_storage_interface/persistent-storage-csi-sc-manage.adoc#overview[Managing the default storage class].
18+
Before deploying the Compliance Operator, you are required to define persistent storage in your cluster to store the raw results output. For more information, see xref:../../../storage/understanding-persistent-storage.adoc#persistent-storage-overview_understanding-persistent-storage[Persistent storage overview] and xref:../../../storage/container_storage_interface/persistent-storage-csi-sc-manage.adoc#overview[Managing the default storage class].
1919
====
2020

2121
include::modules/compliance-operator-console-installation.adoc[leveloffset=+1]

security/compliance_operator/compliance-operator-release-notes.adoc

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,54 @@ To access the latest release, see xref:../../security/compliance_operator/co-man
1717

1818
For more information on compliance support for all Red{nbsp}Hat products, see link:https://access.redhat.com/compliance[Product Compliance].
1919

20+
21+
[id="compliance-operator-release-notes-1-7-0_{context}"]
22+
== OpenShift Compliance Operator 1.7.0
23+
24+
The following advisory is available for the OpenShift Compliance Operator 1.7.0:
25+
26+
* link:https://access.redhat.com/errata/RHBA-2025:3728[RHBA-2025:3728 - OpenShift Compliance Operator 1.7.0 bug fix and enhancement update]
27+
28+
[id="compliance-operator-1-7-0-new-features-and-enhancements_{context}"]
29+
=== New features and enhancements
30+
31+
* A `must-gather` extension is now available for the Compliance Operator installed on `aarch64`, `x86`, `ppc64le`, and `s390x` architectures. The `must-gather` tool provides crucial configuration details to Red Hat Customer Support and engineering. For more information, see xref:../../security/compliance_operator/co-support.adoc#compliance-must-gather_co-support[Using the must-gather tool for the Compliance Operator].
32+
33+
* CIS Benchmark Support has been added to Compliance Operator 1.7.0. The profile supported is CIS OpenShift Benchmark 1.7.0. For more information, see (link:https://issues.redhat.com/browse/CMP-3081[*CMP-3081*])
34+
35+
* Compliance Operator is now supported on `aarch64` architecture for CIS OpenShift Benchmark 1.7.0 and FedRAMP Moderate Revision 4. For more information, see (link:https://issues.redhat.com/browse/CMP-2960[*CMP-2960*])
36+
37+
* Compliance Operator 1.7.0 now supports OpenShift DISA STIG V2R2 profiles for OpenShift and RHCOS. For more information, see (link:https://issues.redhat.com/browse/CMP-3142[*CMP-3142*])
38+
39+
* Compliance Operator 1.7.0 now supports deprecation of old, unsupported profile versions, such as deprecation of CIS 1.4 profiles, CIS 1.5 profiles, DISA STIG V1R1 profiles and DISA STIG V2R1 profiles. For more information, see (link:https://issues.redhat.com/browse/CMP-3149[*CMP-3149*])
40+
41+
* With this release of Compliance Operator 1.7.0, the deprecation of older CIS and DISA STIG profiles mean that these older profiles will no longer be supported with the appearance of Compliance Operator 1.8.0. For more information, see (link:https://issues.redhat.com/browse/CMP-3284[*CMP-3284*])
42+
43+
* With this release of Compliance Operator 1.7.0, BSI profile support is added for OpenShift. For more information, refer to the KCS article link:https://access.redhat.com/articles/7045834[*BSI Quick Check*] and link:https://access.redhat.com/compliance/bsi[*BSI Compliance Summary*].
44+
45+
[id="compliance-operator-1-7-0-bug-fixes_{context}"]
46+
=== Bug fixes
47+
48+
* Before this release, Compliance Operator would provide an unneeded remediation recommendation due to differences in filesystem structure for the `s390x` architecture. With this release, the Compliance Operator now recognizes the differences in filesystem structure and does not provide the misleading remediation. With this update, the rule is now more clearly defined. (link:https://issues.redhat.com/browse/OCPBUGS-33194[*OCPBUGS-33194*])
49+
50+
* Previously, the instructions for rule `ocp4-etcd-unique-ca` did not work for OpenShift 4.17 and later. With this update, the instructions and actionable steps are corrected. (link:https://issues.redhat.com/browse/OCPBUGS-42350[*OCPBUGS-42350*])
51+
52+
* When using the Compliance Operator with Cluster Logging Operator (CLO) version 6.0, various rules would fail. This is due to backwards incompatible changes to the CRDs that CLO uses. The Compliance Operator relies on those CRDs to verify logging functionality. The CRDs have been corrected to support the PCI-DSS profiles with CLO. (link:https://issues.redhat.com/browse/OCPBUGS-43229[*OCPBUGS-43229*])
53+
54+
* After installing Cluster Logging Operator (CLO) 6.0, users found that the ComplianceCheckResult `ocp4-cis-audit-log-forwarding-enabled` was failing because there was a change in the APIversion of the `clusterlogforwarder` resource. Log collection and forwarding configurations are now specified under the new API, part of the observability.openshift.io API group. (link:https://issues.redhat.com/browse/OCPBUGS-43585[*OCPBUGS-43585*])
55+
56+
* For previous releases of Compliance Operator, the scans would generate an error log for the reconcile loop on the Operator pod. With this release, the Compliance Operator controller logic is more stable. (link:https://issues.redhat.com/browse/OCPBUGS-51267[*OCPBUGS-51267*])
57+
58+
* Previously, the rules `file-integrity-exists` or `file-integrity-notification-enabled` would fail on `aarch64` OpenShift clusters. With this update, these rules evaluate as `NOT-APPLICABLE` on `aarch64` systems. (link:https://issues.redhat.com/browse/OCPBUGS-52884[*OCPBUGS-52884*])
59+
60+
* Before this release of the Compliance Operator, the rule `kubelet-configure-tls-cipher-suites` failed for the API server ciphers, resulting in `E2E-FAILURE` status. The rule has been updated to check new ciphers from RFC 8446, which are included with OpenShift 4.18. The rule is now being evaluated correctly. (link:https://issues.redhat.com/browse/OCPBUGS-54212[*OCPBUGS-54212*])
61+
62+
* Previously, the Compliance Operator platform scan would fail and produce the message `failed to parse Ignition config`. With this release, the Compliance Operator is safe to run on 4.19 clusters, when that version of OpenShift is available to customers. (link:https://issues.redhat.com/browse/OCPBUGS-54403[*OCPBUGS-54403*])
63+
64+
* Before this release of Compliance Operator, several rules were not platform aware, creating unneeded errors. Now that the rules have been properly ported to other architectures, those rules run correctly and users can observe some Compliance Check Results reporting `NOT-APPLICABLE` appropriately, depending on the architecture they are using. (link:https://issues.redhat.com/browse/OCPBUGS-53041[*OCPBUGS-53041*])
65+
66+
* Previously, the rule `file-groupowner-ovs-conf-db-hugetlbf` would fail unexpectedly. With this release, the rule fails only when this is the needed result. (link:http://issues.redhat.com/browse/OCPBUGS-55180[*OCPBUGS-55190*])
67+
2068
[id="compliance-operator-release-notes-1-6-2_{context}"]
2169
== OpenShift Compliance Operator 1.6.2
2270

0 commit comments

Comments
 (0)