rhel8_cjis

Criminal Justice Information Services (CJIS) Security Policy

Ansible Role for Criminal Justice Information Services (CJIS) Security Policy

Profile Description:
This profile is derived from FBI's CJIS v5.4
Security Policy. A copy of this policy can be found at the CJIS Security
Policy Resource Center:
https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center

The tasks that are used in this role are generated using OpenSCAP. See the OpenSCAP project for more details on Ansible playbook generation at https://github.com/OpenSCAP/openscap

To submit a fix or enhancement for an Ansible task that is failing or missing in this role, see the ComplianceAsCode project at https://github.com/ComplianceAsCode/content

Requirements

  • Ansible version 2.9 or higher

Role Variables

To customize the role to your liking, check out the list of variables.

Dependencies

N/A

Example Role Usage

Run ansible-galaxy install RedHatOfficial.rhel8_cjis to download and install the role. Then, you can use the following playbook snippet to run the Ansible role:

- hosts: all
  roles:
     - { role: RedHatOfficial.rhel8_cjis }

Next, check the playbook using (on the localhost) the following example:

ansible-playbook -i "localhost," -c local --check playbook.yml

To deploy it, use (this may change configuration of your local machine!):

ansible-playbook -i "localhost," -c local playbook.yml

License

BSD-3-Clause

Author Information

This Ansible remediation role has been generated from the body of security policies developed by the ComplianceAsCode project. Please see https://github.com/complianceascode/content/blob/master/Contributors.md for an updated list of authors and contributors.

Install
ansible-galaxy install RedHatOfficial/ansible-role-rhel8-cjis
GitHub repository
License
other
Downloads
5
Owner
The GitHub organization for Red Hat. This organization contains unsupported open source projects and code that have been started by Red Hat associates.