Hardening Framework releases updated Ansbile os-hardening and ssh-hardening
The Hardening Framework once again updates its framework’s Ansible modules, making them compatible with the new Ansible 2.0 release! But that’s not all. Next to bug-fixes and support for additional operating systems, this release focused on making the os-hardening and ssh-hardening roles more configurable. This allows you to alter them to your needs while still providing a strong baseline security.
As always, thanks for all the contributors!
Notable changes for os-hardening:
- Ansible 2.0 support #59 (rndmh3ro)
- update platforms in meta-file #69 (rndmh3ro)
- Move sysctl vars to defaults #67 (rndmh3ro)
- make sys_uid and sys_gid configurable #62 (rndmh3ro)
- use inspec as test framework #58 (chris-rock)
- Packages as attributes #57 (rndmh3ro)
- Add SINGLE and PROMPT parameters. #55 (rndmh3ro)
- add changelog generator #54 (chris-rock)
- Added sftp_enabled, sftp_chroot_dir, and ssh_client_roaming from the … #57 (shirokatze)
- add test support for ansible 1.9 and 2.0 #56 (rndmh3ro)
- update platforms in meta-file #52 (rndmh3ro)
- Disable experimental client roaming. #49 (rndmh3ro)
- use inspec as test framework #48 (chris-rock)
- add changelog generator #46 (chris-rock)
The Hardening Framework is also available for Chef and Puppet. Be sure to follow us on Twitter for the latest updates.