Major Hayden 809b6cb52d Restart auditd after running augenrules
The augenrules command joins together all of the audit rules from
rules.d and it is run any time the audit rules template changes. However,
the augenrules handler didn't actually restart auditd to apply the
changes to the system.

This patch fires off the auditd restart handler anytime the augenrules
handler is notified.

Closes-bug: 1590916

Change-Id: Ice83fe17ebb0e9edff9da897e435ae96c1778580
2016-06-09 15:14:42 -05:00
2016-05-04 08:56:41 -05:00
2015-10-05 17:37:21 +00:00
2016-05-03 08:58:41 +01:00

openstack-ansible-security

The goal of the openstack-ansible-security role is to improve security within openstack-ansible deployments. The role is based on the Security Technical Implementation Guide (STIG) for Red Hat Enterprise Linux 6.

Requirements

This role can be used with or without the openstack-ansible role. It requires Ansible 1.8.3 at a minimum.

Role Variables

All of the variables for this role are in defaults/main.yml.

Dependencies

This role has no dependencies.

Example Playbook

Using the role is fairly straightforward:

- hosts: servers
  roles:
     - openstack-ansible-security

Running with Vagrant

Security Ansible can be easily run for testing using Vagrant.

To do so run: vagrant destroy To destroy any previously created Vagrant setup vagrant up Spin up Ubuntu Trusty VM and run ansible-security against it

License

Apache 2.0

Author Information

For more information, join #openstack-ansible on Freenode.

Description
Ansible role for security hardening
Readme 5.4 MiB
Languages
Jinja 44.5%
Python 41.2%
Shell 14.3%