47
Compliance, Security Automation, and Remediation with Red Hat CloudForms, Red Hat Satellite, and Ansible Tower by Red Hat Lucy Huh Kerner Senior Cloud Solutions Architect Red Hat North America Public Sector Matt Micene Solutions Architect DLT Solutions

SS42731_v2_KernerMicene

Embed Size (px)

Citation preview

Page 1: SS42731_v2_KernerMicene

Compliance, Security Automation, andRemediation with Red Hat CloudForms, Red Hat Satellite, and Ansible Tower by Red Hat

Lucy Huh KernerSenior Cloud Solutions ArchitectRed Hat North America Public Sector

Matt MiceneSolutions ArchitectDLT Solutions

Page 2: SS42731_v2_KernerMicene

GOAL

● Create a Security Compliant host at Provisioning time by 2 methods:–Red Hat Satellite 6 + OpenSCAP–Red Hat CloudForms + Red Hat Satellite + Ansible Tower by Red Hat

● Automate ongoing Security Remediation and Compliance with:–Red Hat CloudForms + Red Hat Satellite + OpenSCAP–Red Hat CloudForms + Ansible Tower by Red Hat–Red Hat CloudForms Control/Policy Engine + Red Hat Insights

Page 3: SS42731_v2_KernerMicene

WHY AUTOMATE COMPLIANCE ?

Page 4: SS42731_v2_KernerMicene

Compliance, what's it good for?

CA DOJ recommends CIS Critical Security Controls as “minimum level of information security” to meet standard of reasonableness– California Breach Report https://oag.ca.gov/breachreport2016#findings

“Patch management and associated vulnerability management processes represent the biggest problem areas, because they’re rarely well documented and automated.” – Anton Chuvakin [http://blogs.gartner.com/anton-chuvakin/2014/02/13/highlights-from-verizon-pci-report-2014/]

Page 5: SS42731_v2_KernerMicene

Poster created by Ken Westin, 2015, used with permission of author. Hi Ken!

Page 6: SS42731_v2_KernerMicene

WHAT IS SCAP?

SCAP = Security Content Automation Protocol (latest is version 1.2), Specification: NIST SP 800-126 Rev. 2

● CCE™: Common Configuration Enumeration● CPE™: Common Platform Enumeration● CVE®: Common Vulnerabilities and Exposures● CVSS: Common Vulnerability Scoring System● CCSS: Common Configuration Scoring System● XCCDF: The Extensible Configuration Checklist Description Format● OVAL®: Open Vulnerability and Assessment Language● OCIL: Open Checklist Interactive Language● AI: Asset Identification● ARF: Asset Reporting Format

Page 7: SS42731_v2_KernerMicene

WHAT IS OpenSCAP?

NIST validated SCAP scanner by Red Hat

https://nvd.nist.gov/scapproducts.cfm

Page 8: SS42731_v2_KernerMicene

METHOD #1:

Create a Security Compliant host at Provisioning time with:

Red Hat Satellite 6 + OpenSCAP

Page 9: SS42731_v2_KernerMicene

Kickstarting SCAP

Page 10: SS42731_v2_KernerMicene
Page 11: SS42731_v2_KernerMicene
Page 12: SS42731_v2_KernerMicene
Page 13: SS42731_v2_KernerMicene
Page 14: SS42731_v2_KernerMicene

Create new Scan policy

Page 15: SS42731_v2_KernerMicene
Page 16: SS42731_v2_KernerMicene
Page 17: SS42731_v2_KernerMicene
Page 18: SS42731_v2_KernerMicene
Page 19: SS42731_v2_KernerMicene

Update scan host group

Page 20: SS42731_v2_KernerMicene
Page 21: SS42731_v2_KernerMicene
Page 22: SS42731_v2_KernerMicene

Create Kickstart templates

Page 23: SS42731_v2_KernerMicene

https://github.com/nzwulfin/rhsummit16-scap

Page 24: SS42731_v2_KernerMicene
Page 25: SS42731_v2_KernerMicene
Page 26: SS42731_v2_KernerMicene

Put it together in a new host

Page 27: SS42731_v2_KernerMicene
Page 28: SS42731_v2_KernerMicene
Page 29: SS42731_v2_KernerMicene
Page 30: SS42731_v2_KernerMicene
Page 31: SS42731_v2_KernerMicene

METHOD #2:

Create a Security Compliant host at Provisioning time with:

Red Hat CloudForms + Red Hat Satellite + Ansible Tower

Page 32: SS42731_v2_KernerMicene

WHAT IS CLOUDFORMS?

Page 33: SS42731_v2_KernerMicene

Creating a Security Compliant host at Provisioning time with: Red Hat CloudForms + Red Hat Satellite + Ansible Tower

Defense Information Systems Agency Secure Technical Implementation Guide (DISA STIG)

CIS Security Benchmarks

ANSIBLE PLAYBOOK

ANSIBLE PLAYBOOK

Lauch the CloudForms Provisioning State Machine

Post Provisioning Steps

WITH MULTI-TENANCY !!!!

NO NEED TO WRITE ANY CODE !!!!

Page 34: SS42731_v2_KernerMicene

DEMO

Page 35: SS42731_v2_KernerMicene

Automating ongoing Security Remediation and Compliance with: Red Hat CloudForms + Red Hat Satellite + OpenSCAPRed Hat CloudForms + Ansible Tower by Red HatRed Hat CloudForms Control/Policy Engine + Red Hat Insights

Page 36: SS42731_v2_KernerMicene

Automated security scanning and remediation with :Red Hat Satellite 5.7 + OpenSCAP + Red Hat CloudForms

OpenSCAP

XML-RPC

REST API

SCAN RESULTS: PASS/FAIL

REMEDIATE

IF SCAN FAILSTag VM(example: scap_compliant: core_base_osscap_noncompliant: top_secret)

XCCDF XML FILE with list of security checks by Profile id

Create a Report based on scap_compliant and scap_non compliant tags

Page 37: SS42731_v2_KernerMicene

Security remediations with Ansible Tower using Red Hat CloudForms

Page 38: SS42731_v2_KernerMicene

DEMO

Page 39: SS42731_v2_KernerMicene

The Power and Flexibility of the Red Hat CloudForms Control/Policy Engine

Page 40: SS42731_v2_KernerMicene

Managing Shell Shock compliance with Red Hat CloudForms Control

http://cloudformsblog.redhat.com/2014/09/28/shell-shock-bash-code-injection-vulnerability-via-specially-crafted-environment-variables-cve-2014-6271-cve-2014-7169/#more-325

Page 41: SS42731_v2_KernerMicene

OpenSCAP compliance for Containers with Red Hat CloudForms Control

Page 42: SS42731_v2_KernerMicene

Proactive Systems Management with Red Hat Insights

Page 43: SS42731_v2_KernerMicene

SUMMARY●Create a security compliant host at Provisioning time by 2 methods:

●Satellite 6 + OpenSCAP●CloudForms + Satellite + Ansible Tower

●Automate ongoing security remediation and compliance with:●CloudForms + Satellite + OpenSCAP●CloudForms + Ansible Tower●CloudForms Control/Policy Engine and Red Hat Insights

Page 44: SS42731_v2_KernerMicene
Page 45: SS42731_v2_KernerMicene

QUESTIONS ?

Matt MiceneSolutions ArchitectDLT [email protected]: @cleverbeard

Lucy Huh KernerSenior Cloud Solutions ArchitectRed Hat North America Public [email protected]: @LucyCloudBling

Page 46: SS42731_v2_KernerMicene

APPENDIX●Example Satellite 6 provisioning templtae snippet and partition table

●https://github.com/nzwulfin/rhsummit16-scap

●Ansible playbooks for RHEL 6 CIS Benchmarks●https://github.com/major/cis-rhel-ansible

●Ansible role for RHEL 6 DISA STIG from Ansible by Red Hat and MindPointGroup ●https://github.com/ansible/ansible-lockdown●https://github.com/MindPointGroup/RHEL6-STIG

Page 47: SS42731_v2_KernerMicene