$ oc -n stackrox delete pod -lapp=sensor
You can configure RHACS to use the Compliance Operator for compliance reporting and remediation with OpenShift Container Platform clusters. Results from the Compliance Operator are reported in the RHACS Compliance Dashboard.
The Compliance Operator automates the review of numerous technical implementations and compares them with certain aspects of industry standards, benchmarks, and baselines.
The Compliance Operator is not an auditor. To comply or certify to these various standards, you must engage an authorized auditor such as a Qualified Security Assessor (QSA), Joint Authorization Board (JAB), or other industry-recognized regulatory authority to assess your environment.
The Compliance Operator makes recommendations based on generally available information and practices that relate to such standards and can assist with remediation, but actual compliance is your responsibility. You are required to work with an authorized auditor to achieve compliance with a standard.
For the latest updates, see the Compliance Operator release notes.
Install the Compliance Operator using Operator Hub.
If you install the Compliance Operator after Sensor is fully operational, you must restart Sensor in the secured cluster. For more information about restarting Sensor, see "Restarting Sensor in the secured cluster" in the "Additional resources" section. |
In the web console, go to the Operators → OperatorHub page.
Enter compliance operator into the Filter by keyword box to find the Compliance Operator.
Select the Compliance Operator to view the details page.
Read the information about the Operator, and then click Install.
If you installed the Compliance Operator after installing RHACS, you need to restart Sensor in the secured cluster either by using the command-line interface (CLI) or the user interface (UI).
To restart Sensor from the CLI, run the following command:
$ oc -n stackrox delete pod -lapp=sensor
To restart Sensor from the UI, perform the following steps:
Change the active project to stackrox
.
Go to Workloads → Pods.
Locate the pod with the name starting with sensor-
, and then click Actions → Delete Pod.
Create a ScanSettingBinding
object in the openshift-compliance
namespace to scan the cluster by using the cis
and cis-node
profiles.
|
Compliance 2.0 is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process. For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope. |
Select one of the following options:
Use the CLI to create the YAML file and object. For example:
Create a file called sscan.yaml
using the following text:
apiVersion: compliance.openshift.io/v1alpha1
kind: ScanSettingBinding
metadata:
name: cis-compliance
profiles:
- name: ocp4-cis-node
kind: Profile
apiGroup: compliance.openshift.io/v1alpha1
- name: ocp4-cis
kind: Profile
apiGroup: compliance.openshift.io/v1alpha1
settingsRef:
name: default
kind: ScanSetting
apiGroup: compliance.openshift.io/v1alpha1
Create the ScanSettingBinding
object by running the following command:
$ oc create -f sscan.yaml -n openshift-compliance
If successful, the following message is displayed:
$ scansettingbinding.compliance.openshift.io/cis-compliance created
Use the web console to create the object by performing the following steps:
Change the active project to openshift-compliance
.
Click + to open the Import YAML page.
Paste the YAML from the previous example and then click Create.
Run a compliance scan in RHACS.
For more information about running a compliance scan by using the compliance 1.0 feature, see "Running a compliance scan" in the "Additional resources" section.
Ensure that ocp4-cis
and ocp4-cis-node
results are displayed.