diff --git a/DC-public-cloud b/DC-public-cloud
index 4ba7c70..5292a83 100644
--- a/DC-public-cloud
+++ b/DC-public-cloud
@@ -4,6 +4,8 @@
MAIN="MAIN.public-cloud.xml"
ROOTID="public-cloud"
+## Profiling
+PROFOS="sles"
PROFCONDITION="suse-product"
#PROFCONDITION="suse-product;beta"
#PROFCONDITION="community-project"
diff --git a/xml/cha_administration.xml b/xml/cha_administration.xml
index 0244863..01497aa 100644
--- a/xml/cha_administration.xml
+++ b/xml/cha_administration.xml
@@ -338,250 +338,362 @@
-
- Hardening instances
-
- To improve overall security, &suse; provides hardened images of some
- products. The images are hardened using &openscap;, a collection of open source tools that
- implement the Security Content Automation
- Protocol (SCAP) maintained by the National Institute
- of Standards and Technology (NIST). &openscap; supports automated configuration,
- vulnerability and patch checking, technical control compliance activities,
- and security measurement.
-
-
- To harden a system, &openscap; uses security
- rules that define certain security measures. Multiple rules can be combined
- into profiles. For more information, refer to the &openscap; documentation
- at .
-
+
+ Enabling LTSS
+
+ Long Term Service Pack Support (LTSS) extends the lifecycle of
+ &productname;. It is available as an extension. For more information about LTSS, refer to
+ .
+
+
+ LTSS subscriptions are version-specific
+
+ LTSS subscriptions are version-specific. If you have a subscription for
+ &slsa; 15 SP4, you cannot use that registration code to register LTSS on a
+ 15 SP3 image. Make sure to use the correct registration code for your instance
+ and upgrade it if necessary.
+
+
+
+ LTSS on BYOS
+
+ If you do not have an LTSS subscription for your BYOS instance, contact a &suse;
+ representative or visit for purchase
+ options.
+
+
+
+ To enable the LTSS extension, perform the following steps:
+
+
+
+ Log in to the &scc; to look up your LTSS registration
+ code.
+
+
+
+
+ Log in to your instance and make sure your system is registered:
+
+&prompt.sudo;SUSEConnect --status-text
+
+ If the system is not yet registered, register it (see ).
+
+
+
+
+ Check if the LTSS extension is available for your system. For &sle; 15 SP3, it looks
+ like this:
+
+&prompt.sudo;SUSEConnect --list-extensions | grep LTSS
+ SUSE Linux Enterprise Server LTSS 15 SP3 x86_64
+ Activate with: SUSEConnect -p SLES-LTSS/15.3/x86_64 -r ADDITIONAL REGCODE
+
+
+
+ Activate the module as instructed:
+
+&prompt.sudo;SUSEConnect -p SLES-LTSS/15.3/x86_64 -r LTSS_REGISTRATION_CODE
+
+
+
+
+ LTSS on PAYG
+
+ LTSS subscriptions for PAYG can be transacted through a private offer on the CSPs market
+ place or via direct transaction with SUSE. Reach out to cloudsales@suse.com to work out the
+ commercial details. You will receive a subscription and access to the &scc;). With your subscription, you can activate a
+ registration code for LTSS.
+
+
+ Existing LTSS subscriptions
+
+ If you already have an LTSS subscription that you are using in your data center, it will
+ work in the cloud just fine. You can deregister a system in your data center and move that
+ use of your LTSS subscription to an instance in the cloud.
+
+
+
+
+ To enable the LTSS extension, perform the following steps:
+
+
+
+ Log in to the &scc; to activate a registration code.
+ Note that LTSS subscriptions are version-specific. If you have a subscription for
+ &slsa; 15 SP4, you cannot use that registration code to register LTSS on a
+ 15 SP3 image. Make sure to activate the LTSS registration code for
+ the correct version and service pack (SP) of your instance!
+
+
+
+
+ Log in to your instance and make sure your system is registered with a subscription that
+ is eligible for LTSS. If the system is not yet registered, register it
+ (see ).
+
+
+
+
+ Update cloud-regionsrv-client:
+
+ &prompt.sudo;zypper up cloud-regionsrv-client
+
+ You need at least version 10.3.4 of the package.
+
+
+
+
+ Register the LTSS extension with the registration code you activated in the &scc;:
+
+&prompt.sudo;registercloudguset -r LTSS_REGISTRATION_CODE
+Running LTSS registration...this takes a little longer
+LTSS registration succeeded
+
+
+
+
-
- Pre-hardening
-
- Hardened images are pre-hardened to the extent they can safely be hardened
- without causing problems in public cloud frameworks. Certain rules can only
- be applied after instance creation, for example:
-
-
-
-
- Rules that require having passwords set up. Passwords would have to be
- public if configured during the image build. This would defeat the purpose of
- a secret password.
-
-
-
-
- Rules that affect the network configuration. Networking is set up during
- instance creation, therefore it is not possible to limit access during
- image build.
-
-
-
-
- Rules for custom partitioning. &suse;'s public cloud images are
- partitioned to meet the requirements of the framework in which they are
- released. If your system needs to meet standards that require separate
- file systems for given directories, we recommend that you build your own
- images and use LVM or move those directories onto attached disks to get
- the strictest data separation possible.
-
-
-
-
- Rules to remove packages. &suse;'s public cloud images cater to a wide range
- of use cases. Even if the number of packages is limited, it is impossible
- to determine what packages an instance requires.
-
-
-
-
-
- Avialable &openscap; profiles
-
- After instance creation, you can use the installed
- openscap packages to complete the hardening process using
- any of the following profiles:
-
-
-
-
- Standard (standard.profile)
-
+
+ Hardening instances
+
+ To improve overall security, &suse; provides hardened images of some products.
+ The images are hardened using &openscap;, a collection of open
+ source tools that implement the Security Content Automation
+ Protocol (SCAP) maintained by the National Institute
+ of Standards and Technology (NIST). &openscap;
+ supports automated configuration, vulnerability and patch checking, technical control
+ compliance activities, and security measurement.
+
+
+ To harden a system, &openscap; uses security rules that define
+ certain security measures. Multiple rules can be combined into profiles.
+ For more information, refer to the &openscap; documentation at .
+
+
+
+ Pre-hardening
- Basic &openscap; system security
- standard.
+ Hardened images are pre-hardened to the extent they can safely be hardened without causing
+ problems in public cloud frameworks. Certain rules can only be applied after instance
+ creation, for example:
-
-
-
- &cisa; Server Level 2 (cis.profile)
-
+
+
+
+ Rules that require having passwords set up. Passwords would have to be public if
+ configured during the image build. This would defeat the purpose of a secret password.
+
+
+
+
+ Rules that affect the network configuration. Networking is set up during instance
+ creation, therefore it is not possible to limit access during image build.
+
+
+
+
+ Rules for custom partitioning. &suse;'s public cloud images are partitioned to meet the
+ requirements of the framework in which they are released.
+ If your system needs to meet standards that require separate file systems for given
+ directories, we recommend that you build your own images and use LVM or move those
+ directories onto attached disks to get the strictest data separation possible.
+
+
+
+
+ Rules to remove packages. &suse;'s public cloud images cater to a wide range of use
+ cases.
+ Even if the number of packages is limited, it is impossible to determine what packages
+ an instance requires.
+
+
+
+
+
+ Avialable &openscap; profiles
- The &cis; Server Level 2 profile is considered
- to be defense in depth and is intended for environments
- where security is paramount. The recommendations associated with this
- profile can have an adverse effect on your organization if not
- implemented appropriately or without due care. For more information,
- refer to .
+ After instance creation, you can use the installed openscap packages to
+ complete the hardening process using any of the following profiles:
-
-
-
- Department of Defense &stiga; (stig.profile)
-
+
+
+
+ Standard (standard.profile)
+
+
+ Basic &openscap; system security standard.
+
+
+
+
+ &cisa; Server Level 2 (cis.profile)
+
+
+ The &cis; Server Level 2 profile is considered to be
+ defense in depth and is intended for environments where security is
+ paramount.
+ The recommendations associated with this profile can have an adverse effect on your
+ organization if not implemented appropriately or without due care.
+ For more information, refer to .
+
+
+
+
+ Department of Defense &stiga; (stig.profile)
+
+
+ The &disa; publishes &stig;s (&stiga;s) for
+ the Department of Defense.
+ The &stiga; profile replaces the previous &cisa; Level 3 profile and provides all
+ recommendations that are &stiga;-specific.
+ Overlap of recommendations from other profiles, i.e. &cisa; Level 1 and Level 2, are
+ present in the &stiga; profile as applicable.
+ For more information, refer to .
+
+
+
+
+ &hipaaa; Security Rule (hipaa.profile)
+
+
+ In response to the &hipaa; (&hipaaa;) of 1996, the
+ U.S. Department of Health and Human Services developed
+ Security Standards for the Protection of Electronic Protected
+ Health Information, commonly known as the HIPAA Security
+ Rule.
+ It establishes national standards to protect individuals' electronic personal health
+ information (e-PHI) that is created, received, used, or maintained by a covered
+ entity.
+ For more information, refer to .
+
+
+
+
+ &pcidss; (pci-dss.profile)
+
+
+ The &pcidss; (&pcidssa;) is a set of requirements to guide
+ merchants to protect cardholder data. It is maintained by the PCI Security
+ Standards Council (SSC) that was founded by all five major credit card
+ brands Visa, MasterCard, American Express, Discover, and JCB.
+ For more information, refer to .
+
+
+
+
- The &disa; publishes &stig;s
- (&stiga;s) for the Department of Defense.
- The &stiga; profile replaces the previous &cisa; Level 3 profile and
- provides all recommendations that are &stiga;-specific. Overlap of
- recommendations from other profiles, i.e. &cisa; Level 1 and Level 2,
- are present in the &stiga; profile as applicable. For more information,
- refer to .
+ All profile files are available in the ComplianceAsCode
+ repository.
-
-
-
- &hipaaa; Security Rule (hipaa.profile)
-
- In response to the &hipaa; (&hipaaa;) of 1996, the
- U.S. Department of Health and Human Services developed
- Security Standards for the Protection of Electronic Protected
- Health Information, commonly known as the HIPAA
- Security Rule. It establishes national standards to protect
- individuals' electronic personal health information (e-PHI) that is
- created, received, used, or maintained by a covered entity. For more
- information, refer to .
+ For a complete list of rules that have been applied during pre-hardening, refer to pcs-hardening.profile.
+ This profile is a combination of the &stiga; and
+ &cisa; profiles minus rules that can only be applied
+ after instance creation.
-
-
-
- &pcidss; (pci-dss.profile)
-
- The &pcidss; (&pcidssa;) is a set of requirements
- to guide merchants to protect cardholder data. It is maintained by the
- PCI Security Standards Council (SSC) that was founded
- by all five major credit card brands Visa, MasterCard, American Express,
- Discover, and JCB. For more information, refer to .
+ Images of &sles4sap; are hardened using a modified version of the profile
+ called pcs-hardening-sap.profile.
+ Users may need to make additional modifications to the system configuration
+ depending on individual application needs.
-
-
-
-
- All profile files are available in the ComplianceAsCode
- repository.
-
-
- For a complete list of rules that have been applied during pre-hardening,
- refer to pcs-hardening.profile.
- This profile is a combination of the &stiga; and
- &cisa; profiles minus rules that can only be applied
- after instance creation.
-
-
- Images of &sles4sap; are hardened using a modified version of the profile
- called pcs-hardening-sap.profile.
- Users may need to make additional modifications to the system configuration
- depending on individual application needs.
-
-
- Recommended profiles
-
- &suse; recommends using either the &cisa; or the
- &stiga; profile. You can use other profiles at your own
- discretion.
-
-
-
-
-
- Hardening instances with &openscap;
-
- To evaluate an instance, you can run:
-
- &prompt.sudo;oscap xccdf eval \
- --profile stig \
- --results /tmp/results.xml \
- --report /tmp/report.html \
- --stig-viewer /tmp/stigviewer.xml \
- /usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml
-
-
-
- Specifies the profile to use, e.g. stig or
- cis.
-
-
-
-
- Saves the results of the evaluation to /tmp/results.xml
-
-
-
-
- Generates a HTML report called /tmp/report.html in
- addition to the results in XML.
-
-
-
-
- Saves the results to /tmp/stigviewer.xml, which can
- be imported into the DISA STIG Viewer. Refer to for
- information about DISA STIG Viewer.
-
-
-
-
- Scap Security Guide (SSG) policy file in the
- datastream (ds) format. Make sure to select the correct
- version for your instance. To list all available policies, run:
- ls -1 /usr/share/xml/scap/ssg/content/ssg-*-ds.xml.For
- more information about a particular policy, run
- oscap info on the file.
-
-
-
-
- The evaluation process usually takes a few minutes, depending on the number
- of selected rules.
-
-
- To remediate an instance, add the --remediate
- parameter:
-
- &prompt.sudo;oscap xccdf eval --remediate\
- --profile stig \
- --results /tmp/results.xml \
- --report /tmp/report.html \
- --stig-viewer /tmp/stigviewer.xml \
- /usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml
-
-
- More information
-
- For more information on how to harden your &sle; system with &openscap;, refer to the article
- Hardening
- SUSE Linux Enterprise with OpenSCAP. For general
- information on &openscap;, refer to the SCAP
- Security Guide.
-
-
-
+
+ Recommended profiles
+
+ &suse; recommends using either the &cisa; or the
+ &stiga; profile. You can use other profiles at your own
+ discretion.
+
+
+
+
+
+ Hardening instances with &openscap;
+
+ To evaluate an instance, you can run:
+
+&prompt.sudo;oscap xccdf eval \
+--profile stig \
+--results /tmp/results.xml \
+--report /tmp/report.html \
+--stig-viewer /tmp/stigviewer.xml \
+/usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml
+
+
+
+ Specifies the profile to use, e.g. stig or
+ cis.
+
+
+
+
+ Saves the results of the evaluation to /tmp/results.xml
+
+
+
+
+ Generates a HTML report called /tmp/report.html in
+ addition to the results in XML.
+
+
+
+
+ Saves the results to /tmp/stigviewer.xml, which can
+ be imported into the DISA STIG Viewer. Refer to for
+ information about DISA STIG Viewer.
+
+
+
+
+ Scap Security Guide (SSG) policy file in the
+ datastream (ds) format. Make sure to select the correct
+ version for your instance. To list all available policies, run:
+ ls -1 /usr/share/xml/scap/ssg/content/ssg-*-ds.xml.For
+ more information about a particular policy, run
+ oscap info on the file.
+
+
+
+
+ The evaluation process usually takes a few minutes, depending on the number
+ of selected rules.
+
+
+ To remediate an instance, add the --remediate
+ parameter:
+
+&prompt.sudo;oscap xccdf eval --remediate\
+--profile stig \
+--results /tmp/results.xml \
+--report /tmp/report.html \
+--stig-viewer /tmp/stigviewer.xml \
+/usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml
+
+
+ More information
+
+ For more information on how to harden your &sle; system with &openscap;, refer to the article
+ Hardening
+ SUSE Linux Enterprise with OpenSCAP. For general
+ information on &openscap;, refer to the SCAP
+ Security Guide.
+
+
+
diff --git a/xml/product-entities.ent b/xml/product-entities.ent
index 7b6eac0..1c8fd65 100644
--- a/xml/product-entities.ent
+++ b/xml/product-entities.ent
@@ -2,9 +2,16 @@
-
-
-
+&sle;">
+&slereg;">
+&slsa; CSP">
+
+
+
+
+
+
+15.6&product-ga; SP&product-sp;5.5">