Ansible Role for Red Hat STIG for Red Hat Enterprise Linux 10
Profile Description:
This is a profile based on what is expected in the RHEL 10 STIG.
It is not based on the DISA STIG for RHEL 10, because it was not available at time of
the release.
In addition to being applicable to Red Hat Enterprise Linux 10, this
configuration baseline is applicable to the operating system tier of
Red Hat technologies that are based on Red Hat Enterprise Linux 10.
The tasks that are used in this role are generated using OpenSCAP. See the OpenSCAP project for more details on Ansible playbook generation at https://github.com/OpenSCAP/openscap
To submit a fix or enhancement for an Ansible task that is failing or missing in this role, see the ComplianceAsCode project at https://github.com/ComplianceAsCode/content
- Ansible version 2.9 or higher
To customize the role to your liking, check out the list of variables.
N/A
Run ansible-galaxy install RedHatOfficial.rhel10_stig to
download and install the role. Then, you can use the following playbook snippet to run the Ansible role:
- hosts: all
roles:
- { role: RedHatOfficial.rhel10_stig }
Next, check the playbook using (on the localhost) the following example:
ansible-playbook -i "localhost," -c local --check playbook.yml
To deploy it, use (this may change configuration of your local machine!):
ansible-playbook -i "localhost," -c local playbook.yml
BSD-3-Clause
This Ansible remediation role has been generated from the body of security policies developed by the ComplianceAsCode project. Please see https://github.com/complianceascode/content/blob/master/Contributors.md for an updated list of authors and contributors.