3.6 KiB
3.6 KiB
Changelog
All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
2.0.0 - 2025-01-26
Added
CIS Compliance
- CIS Ubuntu 24.04 Level 1 benchmark compliance
- AppArmor mandatory access control (CIS 1.3.x)
- Comprehensive audit rules (CIS 4.1.6-17)
- Enhanced sysctl parameters (CIS 3.1.x, 3.2.x)
- Uncommon network protocols disabled (CIS 3.3.x)
- Core dumps restricted (CIS 1.5.1)
- Security banners (CIS 1.4.x)
SSH User Management
- New
ssh_usersrole for admin user management - Automatic SSH key pair generation on control node
- Password policy enforcement (CIS 5.4.x, 5.5.x)
- PAM configuration for password complexity (CIS 5.5.1)
- Account lockout policies (CIS 5.5.2)
- Password reuse prevention (CIS 5.5.3)
- Sudo configuration with logging (CIS 5.3.x)
- Root SSH login disabled by default
- Root account locking option
Playbooks
users.yml- User management playbookadd_user.yml- Interactive user additionremove_user.yml- Interactive user removalvalidate.yml- Pre-deployment configuration validation
Documentation
CIS_REQUIREMENTS.md- CIS compliance detailsTWO_TIER_DEPLOYMENT.md- Two-tier architecture guide- Updated README with v2.0 features
- SSH key usage instructions
Changed
Firewall Role
- BREAKING:
vpn_networkreplaced withmanagement_allowed_sources(list) - Now supports multiple management sources (IPs and CIDRs)
- Better validation and error messages
- Improved two-tier architecture support
System Hardening Role
- Enhanced with CIS-specific tasks
- New
sysctl_cis.ymlfor CIS network parameters - New
apparmor.ymlfor mandatory access control - New
disable_protocols.ymlfor uncommon protocols - New
core_dumps.ymlfor core dump restriction - Updated
audit.ymlwith comprehensive CIS rules
Inventory
- Added
admin_usersconfiguration examples - Added
management_allowed_sourcesconfiguration - Added CIS-specific variables
- Better documentation and comments
Site Playbook
- Integrated
ssh_usersrole - Enhanced deployment summary with user info
- CIS compliance status in summary
Fixed
- SSH hardening now properly disables root login
- Audit rules now immutable after loading
- Firewall rules properly handle multiple management sources
- Sudo logging configured correctly
Security
- Root SSH login disabled by default
- Password authentication disabled
- Strong SSH ciphers enforced
- AppArmor profiles enforcing
- Comprehensive audit logging
- Account lockout after 5 failed attempts
- Password complexity requirements
- Automatic security updates
1.1.0 - 2025-01-26
Added
- Two-tier architecture support
management_allowed_sourcesfor firewall- Validation playbook
- Host-specific variables for VPN networks
Changed
- Firewall role supports multiple management sources
- Updated documentation for two-tier architecture
1.0.0 - 2025-01-26
Added
- Initial release
- System hardening role
- WireGuard server role
- Secure firewall role
- Basic playbooks (site, hardening, wireguard, firewall)
- Documentation
Security
- SSH hardening
- Sysctl parameters
- Fail2ban
- Auditd
- Automatic updates
- UFW firewall