A profile to see if your Ansible roles are compliant with the [EGI Ansible Style Guide](https://github.com/EGI-Foundation/ansible-style-guide)
This is just me testing something and should NOT be used in a production environment
Based on STIGs found at: http://iase.disa.mil/stigs
A GitHub community health profile compliance check
Shared test suite for chef-client hardening - InSpec Profile.
This Compliance Profile ensures the chef-client configuration is hardened.
This profile implements the CIS Distribution Independent Linux 1.0.1 Benchmark.
This InSpec compliance profile implement the CIS Docker 1.11.0 Benchmark in an automated way to provide security best-practices tests around Docker daemon and containers in a production environment.
InSpec is an open-source run-time framework and rule language used to specify compliance, security, and policy requirements for testing any node in your infrastructure.
This profile implements the CIS Kubernetes 1.1.0 Benchmark.
Inspec profile for detecting CVE-2016-5195 aka Dirty COW
Apache compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io
Linux compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io
Linux patch compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io
MySQL compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io
NGINX compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io
PHP compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io
PostgreSQL compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io
SSH compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io
SSL/TLS compliance profile, used for Security + DevOps. More information is available at http://dev-sec.io