Doc updates

This patch adds a logo for ansible-hardening and adds the newly
supported operating systems to the documentation.

Change-Id: I568cac1ff5f07283533f09a662be53ca0c20c602
This commit is contained in:
Major Hayden 2017-06-13 07:55:21 -05:00
parent 051fe3195f
commit 76b51e3710
No known key found for this signature in database
GPG Key ID: 737051E0C1011FB1
3 changed files with 17 additions and 9 deletions

View File

@ -1,12 +1,15 @@
ansible-hardening ansible-hardening
================= =================
![ansible-hardening-logo](doc/source/_static/ansible-hardening-logo.png)
The ansible-hardening role applies security hardening configurations The ansible-hardening role applies security hardening configurations
from the [Security Technical Implementation Guide(STIG)](http://iase.disa.mil/stigs/Pages/index.aspx) from the [Security Technical Implementation Guide (STIG)](http://iase.disa.mil/stigs/Pages/index.aspx)
to systems running the following distributions: to systems running the following distributions:
* CentOS 7 * CentOS 7
* Debian Jessie *(experimental)* * Debian Jessie *(experimental)*
* Fedora 25 *(experimental)*
* Ubuntu 14.04 *(deprecated)* * Ubuntu 14.04 *(deprecated)*
* Ubuntu 16.04 * Ubuntu 16.04
* Red Hat Enterprise Linux 7 * Red Hat Enterprise Linux 7

Binary file not shown.

After

Width:  |  Height:  |  Size: 39 KiB

View File

@ -1,15 +1,18 @@
============================================ =========================================================
Automated security hardening for Linux hosts Automated security hardening for Linux hosts with Ansible
============================================ =========================================================
.. image:: _static/ansible-hardening-logo.png
:alt: ansible-hardening logo
What does the role do?
----------------------
The ansible-hardening Ansible role uses industry-standard security The ansible-hardening Ansible role uses industry-standard security
hardening guides to secure Linux hosts. Although the role is designed to work hardening guides to secure Linux hosts. Although the role is designed to work
well in OpenStack environments that are deployed with OpenStack-Ansible, it can well in OpenStack environments that are deployed with OpenStack-Ansible, it can
be used with almost any Linux system. be used with almost any Linux system.
What does the role do?
----------------------
It all starts with the `Security Technical Implementation Guide (STIG)`_ from It all starts with the `Security Technical Implementation Guide (STIG)`_ from
the `Defense Information Systems Agency (DISA)`_, part of the United States the `Defense Information Systems Agency (DISA)`_, part of the United States
Department of Defense. The guide is released with a public domain license and Department of Defense. The guide is released with a public domain license and
@ -103,10 +106,12 @@ Ocata
* **Supported Operating Systems:** * **Supported Operating Systems:**
* CentOS 7
* Debian Jessie *(experimental)*
* Fedora 25 *(experimental)*
* Red Hat Enterprise Linux 7 *(partial automated test coverage)*
* Ubuntu 14.04 Trusty *(Deprecated)* * Ubuntu 14.04 Trusty *(Deprecated)*
* Ubuntu 16.04 Xenial * Ubuntu 16.04 Xenial
* CentOS 7
* Red Hat Enterprise Linux 7 *(partial automated test coverage)*
* **Documentation:** * **Documentation:**