+We provide a collection for Ansible, multiple cookbooks for Chef and modules for Puppet to cover this area. We use best-known guides like [Deutsche Telekom](https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/privacy-and-security-assessment-process-358312), [BetterCrypto](https://bettercrypto.org/) and the [NSA hardening guide](https://apps.nsa.gov/iaarchive/library/ia-guidance/security-configuration/operating-systems/guide-to-the-secure-configuration-of-red-hat-enterprise.cfm). For more details look into the respective `test-<project>` repository. Checks are implemented following these guides.
0 commit comments