Skip to content

Commit

Permalink
Updated README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
ComplianceAsCode development team authored and Carlos Matos committed Jun 16, 2021
1 parent d51c036 commit ea72eca
Showing 1 changed file with 18 additions and 18 deletions.
36 changes: 18 additions & 18 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,49 +1,47 @@
# Unclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)

[![Build Status](https://travis-ci.org/RedHatOfficial/ansible-role-rhel8-cui.svg?branch=master)](https://travis-ci.org/RedHatOfficial/ansible-role-rhel8-cui)
[![Ansible Role](https://img.shields.io/ansible/role/40359.svg)](https://galaxy.ansible.com/RedHatOfficial/rhel8_cui)
[![GitHub release](https://img.shields.io/github/release/RedHatOfficial/ansible-role-rhel8-cui.svg)](https://github.com/RedHatOfficial/ansible-role-rhel8-cui/releases/latest)
Unclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)
=========

Ansible Role for Unclassified Information in Non-federal Information Systems and Organizations (NIST 800-171)

Profile Description:
From NIST 800-171, Section 2.2:
Security requirements for protecting the confidentiality of CUI in nonfederal
information systems and organizations have a well-defined structure that
consists of:

(i) a basic security requirements section;
(ii) a derived security requirements section.

The basic security requirements are obtained from FIPS Publication 200, which
provides the high-level and fundamental security requirements for federal
information and information systems. The derived security requirements, which
supplement the basic security requirements, are taken from the security controls
in NIST Special Publication 800-53.

This profile configures Red Hat Enterprise Linux 8 to the NIST Special
Publication 800-53 controls identified for securing Controlled Unclassified
Information (CUI)."
Information (CUI)."

The tasks that are used in this role are generated using OpenSCAP.
See the OpenSCAP project for more details on Ansible playbook generation at [https://github.com/OpenSCAP/openscap](https://github.com/OpenSCAP/openscap)

To submit a fix or enhancement for an Ansible task that is failing or missing,
To submit a fix or enhancement for an Ansible task that is failing or missing in this role,
see the ComplianceAsCode project at [https://github.com/ComplianceAsCode/content](https://github.com/ComplianceAsCode/content)

## Requirements
Requirements
------------

- Ansible version 2.5 or higher

## Role Variables
Role Variables
--------------

To customize the role to your liking, check out the [list of variables](vars/main.yml).
To customize the role to your liking, check out the [list of variables](defaults/main.yml).

## Dependencies
Dependencies
------------

N/A

## Example Playbook
Example Role Usage
----------------

Run `ansible-galaxy install RedHatOfficial.rhel8_cui` to
download and install the role. Then, you can use the following playbook snippet to run the Ansible role:
Expand All @@ -60,11 +58,13 @@ To deploy it, use (this may change configuration of your local machine!):

ansible-playbook -i "localhost," -c local playbook.yml

## License
License
-------

BSD-3-Clause

## Author Information
Author Information
------------------

This Ansible remediation role has been generated from the body of security
policies developed by the ComplianceAsCode project. Please see
Expand Down

0 comments on commit ea72eca

Please sign in to comment.