-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #110 from CamrynCarter/stig-intro
STIGATRON intro update
- Loading branch information
Showing
4 changed files
with
22 additions
and
21 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,22 +1,22 @@ | ||
# Introduction | ||
|
||
This page will walk through Installation and Usage of the STIGATRON component of Rancher Government Carbide. | ||
This section will walk through installation and usage of the STIGATRON component of Rancher Government Carbide. | ||
|
||
## IOC Expectations | ||
## What is STIGATRON? | ||
|
||
As our product is still at Initial Operation Capability (IOC), there are some expectations to level-set: | ||
Our Federal/Government-driven Kubernetes Distribution, RKE2, is the first Kubernetes distribution outside of the upstream project to obtain full DISA STIG Certification. | ||
|
||
- Installation and packaging is still in progress and improving. | ||
STIGATRON was developed to alleviate the pain points of traditional management and maintenance of assessing system compliance, with features including: | ||
|
||
If you see issues and areas for improvement, please submit Github issues [here](https://github.com/rancherfederal/carbide-charts/issues). | ||
1. STIGATRON provides the ability to perform a real-time scan against all downstream clusters being managed by Rancher. | ||
2. These scans will provide a mapping of the current state of the cluster against the controls with the RKE2 DISA STIG. | ||
3. Users can visualize the results of these scans from the Rancher UI by accessing the MITRE Heimdall2 interface. This provides current compliance status, tree maps mapping to NIST 800-53 controls, and a detailed breakdown of each check performed, including the commands executed, the output of those commands, and what steps can be performed to mitigate any failures. | ||
4. Users can also export the scan results into the common formats required by Cyber Systems within the federal space. This includes `XCCDF` and `results.json`. | ||
|
||
## What is this? | ||
## IOC Expectations | ||
|
||
With our Federal/Government driven Kubernetes Distribution RKE2, we worked dilligently to provide the first Kubernetes distribution outside of the upstream project to obtain full DISA STIG Certification. | ||
As our product is still at Initial Operation Capability (IOC), there are some expectations to level-set: | ||
|
||
While having the STIG provides immense benefits to our customers, we also wanted to improve the UX around working with that STIG. That is why we developed STIGATRON. STIGATRON will give our users capabilities that alleviate a lot of the pain points that go with traditional management of maintaining and assessing compliance of your systems: | ||
- Installation and packaging is still in progress and improving. | ||
|
||
1. STIGATRON provides the ability to perform a real-time scan against all downstream clusters being managed by the Rancher Multi-cluster Manager. | ||
2. These scans will provide a mapping of the current state of the cluster against the controls with the RKE2 DISA STIG. | ||
3. Users can visualize the results of these scans from the Rancher UI by access the MITRE Heimdall2 interface. This provides current compliance status, tree maps mapping to NIST 800-53 controls, and a detailed breakdown of each check performed, including the commands executed, the output of those commands, and what steps can be performed to mitigate any failures. | ||
4. Users can also export the scan results into the common formats required by Cyber Systems within the federal space. This includes `XCCDF` and `results.json`. | ||
If you see issues and areas for improvement, please submit Github issues [here](https://github.com/rancherfederal/carbide-charts/issues). |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters