Apply the STIG to even more operating systems with ansible-hardening
Tons of improvements made their way into the ansible-hardening role in preparation for the OpenStack Pike release next month. The role has a new name, new documentation and extra tests.
The role uses the Security Technical Implementation Guide (STIG) produced by the Defense Information Systems Agency (DISA) and applies the guidelines to Linux hosts using Ansible. Every control is configurable via simple Ansible variables and each control is thoroughly documented.
These controls are now applied to an even wider variety of Linux distributions:
- CentOS 7
- Debian 8 Jessie (new for Pike)
- Fedora 25 (new for Pike)
- openSUSE Leap 42.2+ (new for Pike)
- Red Hat Enterprise Linux 7
- SUSE Linux Enterprise 12 (new for Pike)
- Ubuntu 14.04 Trusty
- Ubuntu 16.04 Xenial
Any patches to the ansible-hardening role are tested against all of these operating systems (except RHEL 7 and SUSE Linux Enterprise). Support for openSUSE testing landed this week.
Work is underway to put the finishing touches on the master branch before the Pike release and we need your help!
If you have any of these operating systems deployed, please test the role on your systems! This is pre-release software, so it’s best to apply it only to a new server. Read the “Getting Started” documentation to get started with
Photo credit: Wikipedia