The Security Technical Implementation Guide (STIG) for Red Hat Enterprise Linux 6 contains over 200 security controls. The links below will allow you to review each control based on a certain set of criteria.
Controls are divided into groups based on certain properties:
grub
would be tagged with boot
while controls for sshd
would be tagged with auth.
(This categorization comes from ansible-hardening, not the STIG.)You can also review the STIG controls in one very large page. This can be helpful when you need to search using your web browser.
Note
The RHEL 6 STIG content is deprecated in the Ocata release and will be
removed in a future release. Deployers can choose to deploy the RHEL 6
STIG content by setting the stig_version
Ansible variable:
ansible-playbook -i hosts playbook.yml -e stig_version=rhel7
Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.