mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-05 12:46:18 +01:00
Merge pull request #96440 from dfitzmau/OCPBUGS-57358
OCPBUGS#57358: Added compliance profile warning for disabling sshd im…
This commit is contained in:
@@ -148,6 +148,11 @@ BSI (Bundesamt für Sicherheit in der Informationstechnik, Germany’s Federal O
|
||||
[id="fedramp-high-profiles_{context}"]
|
||||
== FedRAMP High compliance profiles
|
||||
|
||||
[IMPORTANT]
|
||||
====
|
||||
Applying automatic remedations to any profile, such as `rhcos4-stig`, that uses the `service-sshd-disabled` rule, automatically disables the `sshd` service. This situation blocks SSH access to control plane nodes and compute nodes. To keep the SSH access enabled, create a `TailoredProfile` object and set the `rhcos4-service-sshd-disabled` rule value for the `disableRules` parameter.
|
||||
====
|
||||
|
||||
.Supported FedRAMP High compliance profiles
|
||||
[cols="2,2,1,2,1,2", options="header"]
|
||||
|
||||
@@ -393,6 +398,11 @@ BSI (Bundesamt für Sicherheit in der Informationstechnik, Germany’s Federal O
|
||||
[id="stig-profiles_{context}"]
|
||||
== STIG compliance profiles
|
||||
|
||||
[IMPORTANT]
|
||||
====
|
||||
Applying automatic remedations to any profile, such as `rhcos4-stig`, that uses the `service-sshd-disabled` rule, automatically disables the `sshd` service. This situation blocks SSH access to control plane nodes and compute nodes. To keep the SSH access enabled, create a `TailoredProfile` object and set the `rhcos4-service-sshd-disabled` rule value for the `disableRules` parameter.
|
||||
====
|
||||
|
||||
.Supported STIG compliance profiles
|
||||
[cols="2,2,1,2,1,2", options="header"]
|
||||
|
||||
|
||||
Reference in New Issue
Block a user