Remediating Security Exposures Using the Vulnerability Service and Ansible Playbooks

Red Hat Insights 2020-04

Automate the Remediation of CVE Security Vulnerabilities in RHEL Environments

Red Hat Customer Content Services

Abstract

Remediate CVE security vulnerabilities in RHEL environments using the Vulnerability service.
Providing Feedback: If you have a suggestion to improve this documentation, or find an error, submit a Bugzilla report at http://bugzilla.redhat.com. Select the Cloud Software Services (cloud.redhat.com) product and use the Documentation component.

Chapter 1. Creating Ansible Playbooks to remediate CVE exposures on RHEL systems

The following documentation guides Vulnerability service users in creating Ansible Playbooks to automate the remediation of CVEs on RHEL systems.

Vulnerability service users have two approaches they can use in selecting issues for remediation.

  • Remediate multiple CVEs that affect a single system.
  • Remediate multiple systems affected by a single CVE.

Chapter 2. Remediating multiple CVEs affecting a single system

To remediate CVE exposures on a single system, complete the following steps:

Procedure

  1. Navigate to the Vulnerability service > Systems tab and log in if necessary.
  2. Search for a system by name or scroll through the list to locate the system you wish to remediate.
  3. Click on the system name to view system details and list of CVE exposures.
  4. Using the checkboxes to the left of the CVE name, select CVEs to remediate on this system and click Remediate.
  5. Select whether to add the remediations to an Existing Playbook (and select the desired playbook from the dropdown list), or click Create new Playbook by providing a Playbook Name, then click Next.
  6. Verify that the information in the Remediation Summary is correct, toggle Auto Reboot if available and desired, then click Create Playbook.
  7. Locate your playbook in Remediations and download the yaml file.
  8. Add the yaml file to your Ansible workflow.

Chapter 3. Remediating multiple systems affected by a single CVE

To remediate systems of a single CVE exposure, complete the following steps:

  1. Navigate to the Vulnerability service > CVEs tab and log in if necessary.
  2. Click on a CVE to view more information about the individual CVE and scroll down to view all exposed systems.
  3. Select systems to remediate and click Remediate.
  4. Select whether to add the remediations to an Existing Playbook (and select the desired playbook from the dropdown list), or click Create new Playbook by providing a Playbook Name, then click Next.
  5. Verify that the information in the Remediation Summary is correct, toggle Auto Reboot if available and desired, then click Create Playbook.
  6. Locate your playbook in Remediations and download the yaml file.
  7. Add the yaml file to your Ansible workflow.

Chapter 4. Reference materials

To learn more about the Red Hat Insights service, or the other {GUIName_short}, the following resources might also be of interest:

Chapter 5. Important changes with the 2020-04 release of Red Hat Insights

The 2020-04 release of Red Hat Insights includes significant changes to the application features and services.

Changes to the Red Hat Insights application

The Red Hat Insights application now includes the services that were previously bundled with the Cloud Management Services for RHEL application, and were part of the Red Hat Smart Management bundle, along with Red Hat Satellite.

The former cloud management services, plus a couple of new services, are now included in the value that Insights brings to each Red Hat Enterprise Linux (RHEL) subscription.

Insights Advisor

The tools and capabilities that constituted Red Hat Insights prior to this release are now available as the Advisor service. The rules that have always been the currency of Insights are now called Advisor Recommendations.

Insights security rules have moved

The CVE security rules that were previously curated by the Insights rules team are now included with all other Red Hat CVEs in the Vulnerability service. Security rules are high profile CVEs, some of which have been through the Customer Security Awareness Program. They are identifiable in the Vulnerability service by a security rule icon. You can also filter security rules in the Vulnerability service.

Services included with Red Hat Insights

The services included with Red Hat Insights in the 2020-04 release are:

  • Advisor. Identify and fix configuration issues that can negatively impact the availability, performance, stability, and security of RHEL systems.
  • Vulnerability. Assess and monitor the exposure of your RHEL environment to CVEs and security rules.
  • Compliance. Assess and monitor the compliance of your RHEL systems with SCAP security policies.
  • Patch. Enable consistent patch workflows for RHEL systems across the open hybrid cloud.
  • Drift. Compare system configurations of a system over time, or to other systems and baselines, to identify discrepancies in your environment and perform drift analysis.
  • Policies. Evaluate and react to system configuration changes in your environment.

The integrated tools that work with each of the services above are:

  • Inventory. Topological inventory of RHEL systems under Red Hat Insights management
  • Remediations. Repository of Ansible Playbooks that you create and manage using Red Hat Insights
  • Subscription Watch. Comprehensive, product-by-product, account-level subscription reporting service across hybrid cloud deployments

Legal Notice

Copyright © 2020 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.