diff --git a/modules/compliance-supported-profiles.adoc b/modules/compliance-supported-profiles.adoc index 818a1d5de9..f576efc29b 100644 --- a/modules/compliance-supported-profiles.adoc +++ b/modules/compliance-supported-profiles.adoc @@ -148,6 +148,11 @@ BSI (Bundesamt für Sicherheit in der Informationstechnik, Germany’s Federal O [id="fedramp-high-profiles_{context}"] == FedRAMP High compliance profiles +[IMPORTANT] +==== +Applying automatic remedations to any profile, such as `rhcos4-stig`, that uses the `service-sshd-disabled` rule, automatically disables the `sshd` service. This situation blocks SSH access to control plane nodes and compute nodes. To keep the SSH access enabled, create a `TailoredProfile` object and set the `rhcos4-service-sshd-disabled` rule value for the `disableRules` parameter. +==== + .Supported FedRAMP High compliance profiles [cols="2,2,1,2,1,2", options="header"] @@ -393,6 +398,11 @@ BSI (Bundesamt für Sicherheit in der Informationstechnik, Germany’s Federal O [id="stig-profiles_{context}"] == STIG compliance profiles +[IMPORTANT] +==== +Applying automatic remedations to any profile, such as `rhcos4-stig`, that uses the `service-sshd-disabled` rule, automatically disables the `sshd` service. This situation blocks SSH access to control plane nodes and compute nodes. To keep the SSH access enabled, create a `TailoredProfile` object and set the `rhcos4-service-sshd-disabled` rule value for the `disableRules` parameter. +==== + .Supported STIG compliance profiles [cols="2,2,1,2,1,2", options="header"]