1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

Merge pull request #96440 from dfitzmau/OCPBUGS-57358

OCPBUGS#57358: Added compliance profile warning for disabling sshd im…
This commit is contained in:
Servesha Dudhgaonkar
2025-08-18 17:42:02 +05:30
committed by GitHub

View File

@@ -148,6 +148,11 @@ BSI (Bundesamt für Sicherheit in der Informationstechnik, Germanys Federal O
[id="fedramp-high-profiles_{context}"]
== FedRAMP High compliance profiles
[IMPORTANT]
====
Applying automatic remedations to any profile, such as `rhcos4-stig`, that uses the `service-sshd-disabled` rule, automatically disables the `sshd` service. This situation blocks SSH access to control plane nodes and compute nodes. To keep the SSH access enabled, create a `TailoredProfile` object and set the `rhcos4-service-sshd-disabled` rule value for the `disableRules` parameter.
====
.Supported FedRAMP High compliance profiles
[cols="2,2,1,2,1,2", options="header"]
@@ -393,6 +398,11 @@ BSI (Bundesamt für Sicherheit in der Informationstechnik, Germanys Federal O
[id="stig-profiles_{context}"]
== STIG compliance profiles
[IMPORTANT]
====
Applying automatic remedations to any profile, such as `rhcos4-stig`, that uses the `service-sshd-disabled` rule, automatically disables the `sshd` service. This situation blocks SSH access to control plane nodes and compute nodes. To keep the SSH access enabled, create a `TailoredProfile` object and set the `rhcos4-service-sshd-disabled` rule value for the `disableRules` parameter.
====
.Supported STIG compliance profiles
[cols="2,2,1,2,1,2", options="header"]