Compliance, Security
Automation, and
Remediation with Red Hat
CloudForms, Red Hat Satellite,
and Ansible Tower by Red Hat
Lucy Huh Kerner
Senior Cloud Solutions Architect
Red Hat North America Public Sector
Matt Micene
Solutions Architect
DLT Solutions
GOAL
â—Ź Create a Security Compliant host at Provisioning time by 2 methods:
– Red Hat Satellite 6 + OpenSCAP
– Red Hat CloudForms + Red Hat Satellite + Ansible Tower by Red Hat
â—Ź Automate ongoing Security Remediation and Compliance with:
– Red Hat CloudForms + Red Hat Satellite + OpenSCAP
– Red Hat CloudForms + Ansible Tower by Red Hat
– Red Hat CloudForms Control/Policy Engine + Red Hat Insights
WHY AUTOMATE COMPLIANCE ?
Compliance, what's it good for?
CA DOJ recommends CIS Critical Security Controls as “minimum level
of information security” to meet standard of reasonableness
– California Breach Report https://oag.ca.gov/breachreport2016#findings
“Patch management and associated vulnerability management
processes represent the biggest problem areas, because they’re rarely
well documented and automated.”
– Anton Chuvakin [http://blogs.gartner.com/anton-chuvakin/2014/02/13/highlights-
from-verizon-pci-report-2014/]
Poster created by Ken Westin, 2015, used with permission of author. Hi
Ken!
WHAT IS SCAP?
SCAP = Security Content Automation Protocol (latest is version 1.2),
Specification: NIST SP 800-126 Rev. 2
● CCE™: Common Configuration Enumeration
● CPE™: Common Platform Enumeration
● CVE®: Common Vulnerabilities and Exposures
â—Ź CVSS: Common Vulnerability Scoring System
â—Ź CCSS: Common Configuration Scoring System
â—Ź XCCDF: The Extensible Configuration Checklist Description Format
● OVAL®: Open Vulnerability and Assessment Language
â—Ź OCIL: Open Checklist Interactive Language
â—Ź AI: Asset Identification
â—Ź ARF: Asset Reporting Format
WHAT IS OpenSCAP?
NIST validated SCAP scanner by Red Hat
https://nvd.nist.gov/scapproducts.cfm
METHOD #1:
Create a Security Compliant host at Provisioning time
with:
Red Hat Satellite 6 + OpenSCAP
Kickstarting SCAP
Create new Scan policy
Update scan host group
Create Kickstart templates
https://github.com/nzwulfin/rhsummit16-scap
Put it together in a new host
METHOD #2:
Create a Security Compliant host at Provisioning time
with:
Red Hat CloudForms + Red Hat Satellite + Ansible Tower
WHAT IS CLOUDFORMS?
Creating a Security Compliant host at Provisioning time with:
Red Hat CloudForms + Red Hat Satellite + Ansible Tower
Defense Information
Systems Agency Secure
Technical Implementation
Guide (DISA STIG)
CIS Security Benchmarks
ANSIBLE PLAYBOOK
ANSIBLE PLAYBOOK
Lauch the
CloudForms
Provisioning State
Machine
Post
Provisioning
Steps
WITH MULTI-
TENANCY !!!!
NO NEED TO WRITE
ANY CODE !!!!
DEMO
Automating ongoing Security Remediation and
Compliance with:
Red Hat CloudForms + Red Hat Satellite + OpenSCAP
Red Hat CloudForms + Ansible Tower by Red Hat
Red Hat CloudForms Control/Policy Engine + Red Hat Insights
Automated security scanning and remediation with :
Red Hat Satellite 5.7 + OpenSCAP + Red Hat CloudForms
OpenSCAP
XML-RPC
REST API
SCAN RESULTS:
PASS/FAIL
REMEDIATE
IF SCAN FAILS
Tag VM
(example:
scap_compliant: core_base_os
scap_noncompliant: top_secret)
XCCDF XML FILE with list of
security checks by Profile id
Create a Report based on scap_compliant
and scap_non compliant tags
Security remediations with Ansible Tower
using Red Hat CloudForms
DEMO
The Power and Flexibility of the Red Hat CloudForms
Control/Policy Engine
Managing Shell Shock compliance with Red Hat CloudForms Control
http://cloudformsblog.redhat.com/2014/09/28/shell-shock-bash-code-injection-vulnerability-via-specially-crafted-environment-variables-cve-2014-6271-cve-
2014-7169/#more-325
OpenSCAP compliance for Containers with Red Hat CloudForms Control
Proactive Systems Management with Red Hat Insights
SUMMARY
â—ŹCreate a security compliant host at Provisioning time by 2 methods:
â—ŹSatellite 6 + OpenSCAP
â—ŹCloudForms + Satellite + Ansible Tower
â—ŹAutomate ongoing security remediation and compliance with:
â—ŹCloudForms + Satellite + OpenSCAP
â—ŹCloudForms + Ansible Tower
â—ŹCloudForms Control/Policy Engine and Red Hat Insights
QUESTIONS ?
Matt Micene
Solutions Architect
DLT Solutions
matt.micene@dlt.com
Twitter: @cleverbeard
Lucy Huh Kerner
Senior Cloud Solutions Architect
Red Hat North America Public Sector
lkerner@redhat.com
Twitter: @LucyCloudBling
APPENDIX
â—ŹExample Satellite 6 provisioning templtae snippet and partition table
â—Źhttps://github.com/nzwulfin/rhsummit16-scap
â—ŹAnsible playbooks for RHEL 6 CIS Benchmarks
â—Źhttps://github.com/major/cis-rhel-ansible
â—ŹAnsible role for RHEL 6 DISA STIG from Ansible by Red Hat and
MindPointGroup
â—Źhttps://github.com/ansible/ansible-lockdown
â—Źhttps://github.com/MindPointGroup/RHEL6-STIG
SS42731_v2_KernerMicene

SS42731_v2_KernerMicene

  • 1.
    Compliance, Security Automation, and Remediationwith Red Hat CloudForms, Red Hat Satellite, and Ansible Tower by Red Hat Lucy Huh Kerner Senior Cloud Solutions Architect Red Hat North America Public Sector Matt Micene Solutions Architect DLT Solutions
  • 2.
    GOAL ● Create aSecurity Compliant host at Provisioning time by 2 methods: – Red Hat Satellite 6 + OpenSCAP – Red Hat CloudForms + Red Hat Satellite + Ansible Tower by Red Hat ● Automate ongoing Security Remediation and Compliance with: – Red Hat CloudForms + Red Hat Satellite + OpenSCAP – Red Hat CloudForms + Ansible Tower by Red Hat – Red Hat CloudForms Control/Policy Engine + Red Hat Insights
  • 3.
  • 4.
    Compliance, what's itgood for? CA DOJ recommends CIS Critical Security Controls as “minimum level of information security” to meet standard of reasonableness – California Breach Report https://oag.ca.gov/breachreport2016#findings “Patch management and associated vulnerability management processes represent the biggest problem areas, because they’re rarely well documented and automated.” – Anton Chuvakin [http://blogs.gartner.com/anton-chuvakin/2014/02/13/highlights- from-verizon-pci-report-2014/]
  • 5.
    Poster created byKen Westin, 2015, used with permission of author. Hi Ken!
  • 6.
    WHAT IS SCAP? SCAP= Security Content Automation Protocol (latest is version 1.2), Specification: NIST SP 800-126 Rev. 2 ● CCE™: Common Configuration Enumeration ● CPE™: Common Platform Enumeration ● CVE®: Common Vulnerabilities and Exposures ● CVSS: Common Vulnerability Scoring System ● CCSS: Common Configuration Scoring System ● XCCDF: The Extensible Configuration Checklist Description Format ● OVAL®: Open Vulnerability and Assessment Language ● OCIL: Open Checklist Interactive Language ● AI: Asset Identification ● ARF: Asset Reporting Format
  • 7.
    WHAT IS OpenSCAP? NISTvalidated SCAP scanner by Red Hat https://nvd.nist.gov/scapproducts.cfm
  • 8.
    METHOD #1: Create aSecurity Compliant host at Provisioning time with: Red Hat Satellite 6 + OpenSCAP
  • 9.
  • 14.
  • 19.
  • 22.
  • 23.
  • 26.
    Put it togetherin a new host
  • 31.
    METHOD #2: Create aSecurity Compliant host at Provisioning time with: Red Hat CloudForms + Red Hat Satellite + Ansible Tower
  • 32.
  • 33.
    Creating a SecurityCompliant host at Provisioning time with: Red Hat CloudForms + Red Hat Satellite + Ansible Tower Defense Information Systems Agency Secure Technical Implementation Guide (DISA STIG) CIS Security Benchmarks ANSIBLE PLAYBOOK ANSIBLE PLAYBOOK Lauch the CloudForms Provisioning State Machine Post Provisioning Steps WITH MULTI- TENANCY !!!! NO NEED TO WRITE ANY CODE !!!!
  • 34.
  • 35.
    Automating ongoing SecurityRemediation and Compliance with: Red Hat CloudForms + Red Hat Satellite + OpenSCAP Red Hat CloudForms + Ansible Tower by Red Hat Red Hat CloudForms Control/Policy Engine + Red Hat Insights
  • 36.
    Automated security scanningand remediation with : Red Hat Satellite 5.7 + OpenSCAP + Red Hat CloudForms OpenSCAP XML-RPC REST API SCAN RESULTS: PASS/FAIL REMEDIATE IF SCAN FAILS Tag VM (example: scap_compliant: core_base_os scap_noncompliant: top_secret) XCCDF XML FILE with list of security checks by Profile id Create a Report based on scap_compliant and scap_non compliant tags
  • 37.
    Security remediations withAnsible Tower using Red Hat CloudForms
  • 38.
  • 39.
    The Power andFlexibility of the Red Hat CloudForms Control/Policy Engine
  • 40.
    Managing Shell Shockcompliance with Red Hat CloudForms Control http://cloudformsblog.redhat.com/2014/09/28/shell-shock-bash-code-injection-vulnerability-via-specially-crafted-environment-variables-cve-2014-6271-cve- 2014-7169/#more-325
  • 41.
    OpenSCAP compliance forContainers with Red Hat CloudForms Control
  • 42.
    Proactive Systems Managementwith Red Hat Insights
  • 43.
    SUMMARY â—ŹCreate a securitycompliant host at Provisioning time by 2 methods: â—ŹSatellite 6 + OpenSCAP â—ŹCloudForms + Satellite + Ansible Tower â—ŹAutomate ongoing security remediation and compliance with: â—ŹCloudForms + Satellite + OpenSCAP â—ŹCloudForms + Ansible Tower â—ŹCloudForms Control/Policy Engine and Red Hat Insights
  • 45.
    QUESTIONS ? Matt Micene SolutionsArchitect DLT Solutions matt.micene@dlt.com Twitter: @cleverbeard Lucy Huh Kerner Senior Cloud Solutions Architect Red Hat North America Public Sector lkerner@redhat.com Twitter: @LucyCloudBling
  • 46.
    APPENDIX â—ŹExample Satellite 6provisioning templtae snippet and partition table â—Źhttps://github.com/nzwulfin/rhsummit16-scap â—ŹAnsible playbooks for RHEL 6 CIS Benchmarks â—Źhttps://github.com/major/cis-rhel-ansible â—ŹAnsible role for RHEL 6 DISA STIG from Ansible by Red Hat and MindPointGroup â—Źhttps://github.com/ansible/ansible-lockdown â—Źhttps://github.com/MindPointGroup/RHEL6-STIG