Doc updates
This patch adds a logo for ansible-hardening and adds the newly supported operating systems to the documentation. Change-Id: I568cac1ff5f07283533f09a662be53ca0c20c602
This commit is contained in:
parent
051fe3195f
commit
76b51e3710
@ -1,12 +1,15 @@
|
||||
ansible-hardening
|
||||
=================
|
||||
|
||||

|
||||
|
||||
The ansible-hardening role applies security hardening configurations
|
||||
from the [Security Technical Implementation Guide(STIG)](http://iase.disa.mil/stigs/Pages/index.aspx)
|
||||
from the [Security Technical Implementation Guide (STIG)](http://iase.disa.mil/stigs/Pages/index.aspx)
|
||||
to systems running the following distributions:
|
||||
|
||||
* CentOS 7
|
||||
* Debian Jessie *(experimental)*
|
||||
* Fedora 25 *(experimental)*
|
||||
* Ubuntu 14.04 *(deprecated)*
|
||||
* Ubuntu 16.04
|
||||
* Red Hat Enterprise Linux 7
|
||||
|
BIN
doc/source/_static/ansible-hardening-logo.png
Normal file
BIN
doc/source/_static/ansible-hardening-logo.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 39 KiB |
@ -1,15 +1,18 @@
|
||||
============================================
|
||||
Automated security hardening for Linux hosts
|
||||
============================================
|
||||
=========================================================
|
||||
Automated security hardening for Linux hosts with Ansible
|
||||
=========================================================
|
||||
|
||||
.. image:: _static/ansible-hardening-logo.png
|
||||
:alt: ansible-hardening logo
|
||||
|
||||
What does the role do?
|
||||
----------------------
|
||||
|
||||
The ansible-hardening Ansible role uses industry-standard security
|
||||
hardening guides to secure Linux hosts. Although the role is designed to work
|
||||
well in OpenStack environments that are deployed with OpenStack-Ansible, it can
|
||||
be used with almost any Linux system.
|
||||
|
||||
What does the role do?
|
||||
----------------------
|
||||
|
||||
It all starts with the `Security Technical Implementation Guide (STIG)`_ from
|
||||
the `Defense Information Systems Agency (DISA)`_, part of the United States
|
||||
Department of Defense. The guide is released with a public domain license and
|
||||
@ -103,10 +106,12 @@ Ocata
|
||||
|
||||
* **Supported Operating Systems:**
|
||||
|
||||
* CentOS 7
|
||||
* Debian Jessie *(experimental)*
|
||||
* Fedora 25 *(experimental)*
|
||||
* Red Hat Enterprise Linux 7 *(partial automated test coverage)*
|
||||
* Ubuntu 14.04 Trusty *(Deprecated)*
|
||||
* Ubuntu 16.04 Xenial
|
||||
* CentOS 7
|
||||
* Red Hat Enterprise Linux 7 *(partial automated test coverage)*
|
||||
|
||||
* **Documentation:**
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user