-
With this release, automatic remediation for API server encryption now applies the appropriate encryption mode based on OpenShift version: AES-GCM for OpenShift 4.13.0 and higher versions, AES-CBC for earlier versions. Both encryption modes remain compliant across all OpenShift versions. For more information, see (CMP-3248).
-
Prior to this release, Compliance Operator would remediate SSH settings on RHCOS hosts by deploying a fixed sshd_config file containing all SSH hardening settings. If the scan for corresponding rules failed, this could result in unintended configuration changes to SSH. With this release, Compliance Operator applies very specific remediations to SSH according to the rules shown in https://github.com/ComplianceAsCode/content/blob/master/shared/macros/10-kubernetes.jinja#L1-L154. For more information, see (CMP-3553).
-
For prior versions of Compliance Operator, the log rotation function depended on finding the logrotate file in the /etc/cron.daily folder. With this release, Compliance Operator works with the logrotate.timer service. This provides reliable log rotation behavior from Compliance Operator.
-
For previous versions of Compliance Operator, it is possible for the STIG ID to be omitted from the compliance report. These omissions were caused by missing stigref and stigid values. With this release, the omissions have been corrected and now STIG ID reliably shows up in the compliance report.
-
Prior to this release, Compliance Operator STIG control CNTR-OS-000720 selected rule rhcos4-audit-rules-suid-privilege-function, but since the rule was not available in Compliance Operator, no output was generated. With this release, the rule, rhcos4-audit-rules-suid-privilege-function is now available in Compliance Operator and listed in the scan output. For more information, see (CMP-3558).
-
In previous versions of Compliance Operator, scanning with the ocp4-stig profile would fail for the rule ocp4-stig-modified-audit-log-forwarding-uses-tls even if TLS is enabled correctly. This would occur because the tls:// field is no longer required by the ClusterLogForwarder resource, causing the scan output to show an incorrect FAIL result. With this release, the protocol prefix is not required and the scan output produces correct results. For more information, see (routes-protected-by-tls compliance check failing when ODF 4.11 is installed).
-
Previously, there was no automated method to check if API servers were using unsupported configuration overrides as recommended by CIS Benchmark control 1.2.31 or 1.2.33. This release provides dedicated rules for checking for unsupported configuration overrides.
-
For prior releases of Compliance Operator, some rules were missing a variable reference in the annotation, such as rule resource-requests-limits. With this release, the variable reference is available for rules and the erroneous output is eliminated. For more information, see (CMP-3582).
-
Previously, the ocp4-routes-rate-limit rule required setting rate limits for all routes outside the openshift and kube namespaces. However, using the feature and scanning for it presented problems because other namespaces managed by critical Operators should not be modified and not be scanned for the modification by Compliance Operator. With this release, routes managed by critical Operators are not flagged as errors by the Compliance Operator.
-
In prior versions of Compliance Operator, a ComplianceScan reported the warning SDN not found when the openshift-sdn networking provider was not found. In this release, Compliance Operator suppresses the warning when OpenShift-SDN is not the active networking provider. For more information, see (CMP-3591).
-
Previously, duplicate variables could be accidentally created in TailoredProfile and were not correctly detected by Compliance Operator. With this release, duplicate setValues in TailoredProfile are identified and trigger a warning event from a compliance scan.
-
In previous releases of Compliance Operator, the rule ocp4-audit-log-forwarding-uses-tls failed when the clusterlogforwarder output configuration contained maps without a URL key. With this release, the rule correctly filters for outputs that have a URL field, showing PASS when TLS is properly enabled for clusterlogforwarder. For more information, see (CMP-3597).
-
In prior versions of Compliance Operator, for the rule rhcos4-service-systemd-coredump-disabled, no remediation was generated after scanning the cluster. In this release, remediation is provided for rhcos4-service-systemd-coredump-disabled.
-
In prior versions of Compliance Operator, the rule to check the setting of imagestream.spec.tags.importPolicy.scheduled would return FAIL even when the configuration was correct. With this release, the rule now correctly excludes imagestreams managed by the samples operator and those owned by ClusterVersion, resulting in accurate compliance status reporting.
-
In prior releases, Compliance Operator included outdated TLS cipher suite rules which used unsupported configuration overrides with defective remediations. With this release, these outdated rules have been removed from the default profile. Also, the ocp4-kubelet-configure-tls-cipher-suites-ingresscontroller rule has been renamed to ocp4-ingress-controller-tls-cipher-suites for better organization. For more information, see (CMP-3606).
-
In prior versions of Compliance Operator, creating ComplianceScans directly with custom content images failed during the profile deprecation check. With this release, Compliance Operator gracefully handles cases where the ProfileBundle cannot be determined, logging an informational message instead of failing the scan. For more information, see (CMP-3613).
-
Previously, Compliance Operator scanned incorrectly flagged passthrough routes as NON-COMPLIANT with the ocp4-routes-protected-by-tls rule. With this release, passthrough routes are properly excluded from this rule because they delegate TLS termination to the backend application.