If you don’t have an explicit requirement/versions for specifying datastream and xccdf-id you can might away with:
%addon com_redhat_oscap
content-type = scap-security-guide
profile = xccdf_org.ssgproject.content_profile_cis
%end
Which should use the local security guide as is providing the scap-security-guide and oscap-scanner are part of the initial packages install.
As a note, oscap-anaconda-addon is depreciated as of RHEL/AlmaLinux 10 so worth going down the route of standardising your %post hardening script.