Skip to content

Commit 2acf52a

Browse files
committed
Drop CentOS/Rocky 8 from CIS security hardening
These OS versions are no longer supported.
1 parent ff03e1a commit 2acf52a

File tree

4 files changed

+0
-54
lines changed

4 files changed

+0
-54
lines changed

doc/source/configuration/security-hardening.rst

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@ improvement over an unhardened system. A typical score would be 70%.
1212

1313
The following operating systems are supported:
1414

15-
- Rocky 8, RHEL 8, CentOS Stream 8
1615
- Ubuntu 22.04
1716
- Rocky 9
1817

@@ -26,23 +25,12 @@ instance, you may want different rules on a network node compared to a
2625
controller. It is best to consult the upstream role documentation for details
2726
about what each variable does. The documentation can be found here:
2827

29-
- `Rocky 8, RHEL 8, CentOS Stream 8 <https://github.com/ansible-lockdown/RHEL8-CIS/tree/1.3.0>`__
3028
- `Ubuntu 22.04 <https://github.com/ansible-lockdown/UBUNTU22-CIS>`__
3129
- `Rocky 9 <https://github.com/ansible-lockdown/RHEL9-CIS>`__
3230

3331
Running the playbooks
3432
---------------------
3533

36-
.. note:
37-
38-
On CentOS 8, you must run with `INJECT_FACT_AS_VARS <https://docs.ansible.com/ansible/latest/reference_appendices/config.html#inject-facts-as-vars>`__
39-
enabled. To do this for this playbook only, you can use:
40-
41-
.. code-block: shell
42-
43-
ANSIBLE_INJECT_FACT_VARS=true kayobe playbook run $KAYOBE_CONFIG_PATH/ansible/cis.yml
44-
45-
4634
As there is potential for unintended side effects when applying the hardening
4735
playbooks, the playbooks are not currently enabled by default. It is recommended
4836
that they are first applied to a representative staging environment to determine

etc/kayobe/ansible/cis.yml

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -10,19 +10,6 @@
1010
state: present
1111
when: ansible_facts.distribution == 'Ubuntu'
1212

13-
- name: Remove /etc/motd
14-
# See remediation in:
15-
# https://github.com/wazuh/wazuh/blob/bfa4efcf11e288c0a8809dc0b45fdce42fab8e0d/ruleset/sca/centos/8/cis_centos8_linux.yml#L777
16-
file:
17-
path: /etc/motd
18-
state: absent
19-
when: ansible_facts.os_family == 'RedHat' and ansible_facts.distribution_major_version == '8'
20-
21-
- include_role:
22-
name: ansible-lockdown.rhel8_cis
23-
when: ansible_facts.os_family == 'RedHat' and ansible_facts.distribution_major_version == '8'
24-
tags: always
25-
2613
- include_role:
2714
name: ansible-lockdown.rhel9_cis
2815
when: ansible_facts.os_family == 'RedHat' and ansible_facts.distribution_major_version == '9'

etc/kayobe/ansible/requirements.yml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,6 @@ collections:
1212
version: 2.4.0
1313
roles:
1414
- src: stackhpc.vxlan
15-
- name: ansible-lockdown.rhel8_cis
16-
src: https://github.com/ansible-lockdown/RHEL8-CIS
17-
version: 1.3.0
1815
- name: ansible-lockdown.ubuntu22_cis
1916
src: https://github.com/stackhpc/UBUNTU22-CIS
2017
#FIXME: Waiting for https://github.com/ansible-lockdown/UBUNTU22-CIS/pull/174

etc/kayobe/inventory/group_vars/overcloud/cis

Lines changed: 0 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -5,32 +5,6 @@
55
# Enable collecting auditd logs
66
update_audit_template: true
77

8-
##############################################################################
9-
# RHEL 8 / Centos Stream 8 CIS Hardening Configuration
10-
11-
# NOTE: kayobe configures NTP. Do not clobber configuration.
12-
rhel8cis_time_synchronization: skip
13-
rhel8cis_rule_2_2_1_1: false
14-
rhel8cis_rule_2_2_1_2: false
15-
16-
# NOTE: disable CIS rolefirewall configuration
17-
rhel8cis_firewall: skip
18-
rhel8cis_rule_3_4_1_1: false
19-
20-
# NOTE: kayobe does not currently support selinux
21-
rhel8cis_selinux_disable: true
22-
23-
# NOTE: This updates the system. Let's do this explicitly.
24-
rhel8cis_rule_1_9: false
25-
26-
# NOTE: FUTURE breaks wazuh agent repo metadata download
27-
rhel8cis_crypto_policy: FIPS
28-
29-
# NOTE: We will remove /etc/motd instead. This prevents a duplicate warning
30-
# from being displayed.
31-
rhel8cis_rule_1_8_1_1: false
32-
rhel8cis_rule_1_8_1_4: false
33-
348
##############################################################################
359
# Rocky 9 CIS Hardening Configuration
3610

0 commit comments

Comments
 (0)