Compliand and reporting tool for Satellite
Hello All,
Does anyone knows or implemented OpenScap or any other reporting tools in Satellite 6.2.13 successfully?
Any help is appreciated and thanks in advance.
Regards,
MP.
Responses
Hi Mike Patel,
Also check this https://access.redhat.com/solutions/2377951.
Additionally, the OpenScap documentation is useful (I like the command-line version for individual scans, this is separate/apart from the above for one-off scanning of systems). This is an upstream project documentation. When you land there, scroll down at https://www.open-scap.org/getting-started/ and you’ll see instructions for a GUI and command-line versions. Again, this is separate from your question, for one-off systems you may wish to scan individually for whatever reason.
Let us know if you need anything further
-RJ
That's odd that url is giving an error, I just looked at the URL earlier today. Maybe they are having a temporary error. I just checked it now, and see the same error you report. Oddly, it worked earlier today. Hopefully this is a temporary issue.
There used to be a wonderful tool called spacewalk-report under the previous satellite that could be used for inventory queries. I will post back soon (hopefully) with something that kinda replaces that... kinda. However, check this discussion https://access.redhat.com/discussions/1395523 Also check (and I mean test in a test environment, heavily examine this sat6inventory script).
Annoyingly, I have something, but it's at another customer site that I'll be visiting later in the month. However, in the meantime, try this https://access.redhat.com/solutions/2481861. I thought I had a hammer command that would do something like this, or some script, I just don't have it with me now.
SCAP can do a number of things, and it's based on the xml file (profile file) you use. In the case of SCAP and security reporting, there are a number of profiles you can use. Everything from DISA STIG to other varieties.
We haven't used puppet within the satellite server, we have our own separate puppet server. We have used SCAP with ansible-playbooks (not Ansible Tower, but the free version of Ansible). We generally push out jobs using ansible-playbooks to our systems using ansible playbooks such as SCAP security compliance reports (there will be false positives, and there will be things you will likely want to either acquire an exception based on sane operational needs of your organization)
EDITED/ADDED: Here's documentation on Ansible Playbook, Now there is a paid product named "Ansible Tower" (does wonderful things), but it it is sold as a product by Red Hat. You can use the "EPEL" version of Ansible for free. "EPEL" is "Extra Packages for Enterprise Linux" which is described here https://access.redhat.com/solutions/3358
Hi Mike Patel,
Ansible Tower is a wonderful product. If you have Red Hat Online Training, I'd highly recommend going through that portion which is included (courses D0409 & D0410).
I just found in the Red Hat Satellite version 6.2 Host Configuration Guide in Chapter 5, instructions on SCAP, I'm hoping that helps. Now paragraph 5.4.1 of that document seems to show an overview including Compliance Reports Overview in Paragraph 5.4.2 which seems to likely fall in line with what you're interested in (along with the surrounding context).
I intend on getting that command I use to get an inventory, it is at a customer site, but if I find it prior, I'll post it here.
Regular SCAP, perhaps for one-off reports, or stand-alone-network (non-satellite). (This is for someone who may want SCAP but doesn't have satellite) The SCAP guide I mentioned previously, that website https://www.open-scap.org/getting-started/ is now functioning again (see my original post at top). I have an ansible playbook that runs a script which names the file based on the date and hostname in a standard location. If you had a few systems, the reporting location could be shared (nfs share), and variables set such that each system reports into it's own specific directory with a proper time/date stamp.
Kind Regards, -RJ
The thing I hate about the way they recommend pushing things through foreman is that they say in their docs/solutions to set up a no-password sudoer rule for that account which we can't accept due to security reasons. If that account gets compromised, it would be ... "bad", and we just can't do that due to sane security policies. One can certainly use puppet, but Ansible (doesn't have to be Ansible Tower) can be set up with sudo rights to where you can create the necessary ansible playbooks to achieve this goal without having to "just take" the unacceptable risk of no-password sudo directives for the foreman account.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
