Generating Vulnerability Service Reports
Communicate the Exposure of RHEL Systems to CVE Security Vulnerabilities
Making open source more inclusive
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright’s message.
Providing feedback on Red Hat Hybrid Cloud Console documentation
We appreciate your input on our documentation. Please let us know how we could make it better. To do so, create a Bugzilla ticket:
- Go to the Bugzilla website.
- As the Component, use Documentation.
- Fill in the Description field with your suggestion for improvement. Include a link to the relevant part(s) of documentation.
- Click Submit Bug.
Chapter 1. Overview of Insights for RHEL vulnerability service reporting
The ability to convey the security exposure of your infrastructure to different stakeholders—DevOps team, security team, executive team—is vital. The vulnerability service enables you to download the following reports to analyze offline or share with others:
- Executive Reports. PDF summary and overview of the security vulnerability exposure your infrastructure, intended for executive audiences
- CVE reports. PDF report of selected, filtered CVEs to which your infrastructure is exposed, intended to highlight and share vulnerability data
- Vulnerability data export. Export of selected CVE data, based on filters you have in place when you perform the export, to a JSON or CSV file
Chapter 2. Executive reports
You can download a high-level executive report summarizing the security exposure of your infrastructure. Executive reports are two to three-page PDF files, designed for an executive audience, and include the following information:
On page 1
- Number of RHEL systems analyzed
- Number of individual CVEs to which your systems are currently exposed
- Number of security rules in your infrastructure
On page 2
- Percentage of CVEs by severity (CVSS base score) range
- Number of CVEs published by 7, 30, and 90 day time frame
- Top three CVEs in your infrastructure, including security rules and known exploits
On page 3
- Security rule breakdown by severity
- Top 3 security rules, including severity and number of exposed systems
2.1. Downloading an executive report
Use the following steps to download an executive report:
- Navigate to the Red Hat Enterprise Linux > Vulnerability > Reports tab and log in if necessary.
- On the Executive report card, click Download PDF.
- Click Save File and click OK.
Verify that the PDF file is in your
Downloadsfolder or other specified location.
2.2. Downloading an executive report using the vulnerability service API
You can download an executive report using the vulnerability service API.
- Request URL: https://cloud.redhat.com/api/vulnerability/v1/v1/report/executive
curl -X GET "https://cloud.redhat.com/api/vulnerability/v1/v1/report/executive" -H "accept: application/vnd.api+json"
Chapter 3. Reports by CVEs
You can create a PDF report showing CVEs to which your systems are exposed. Select CVEs, filtered by severity or security rules, for example, and present curated, focused data to specific stakeholders.
The CVE report lists the CVEs, linking each to the respective CVE page in the Red Hat CVE database so you can learn more about it. The list is ordered primarily by the publish date of the CVE, with the most recently published CVEs at the top of the list.
3.1. Exporting a CVE report to PDF
Use the following procedure to create a point-in-time snapshot of CVEs to which your systems are exposed.
- Navigate to Red Hat Enterprise Linux > Vulnerability > Reports in the Insights for Red Hat Enterprise Linux application. Log in if necessary.
- On the Report by CVEs card, click Create report.
Make selections as needed in the pop-up card:
- Optionally, customize the report title based on the CVEs you are showing.
- Under Filter CVEs by, click each filter dropdown and select a value.
- Under CVE data to include, Choose columns is activated by default, allowing you to deselect columns you do not want to include. Leave all boxes checked, or click All columns to show everything.
- Optionally add notes to give the report context for the audience.
- Click Export report and allow the application a minute to generate the report.
- Select whether to open or save the PDF file and click OK.
- Navigate to the saved PDF location and view the CVEs report.
Chapter 4. Exporting vulnerability data as JSON, CSV, or PDF file
The vulnerability service enables you to export data for CVEs on systems in your RHEL infrastructure. After applying filters in the vulnerability service to view a specific set of CVEs or systems, you can export data based on those criteria.
These reports are accessible through the Insights for Red Hat Enterprise Linux application and can be exported and downloaded as .csv, .json, or PDF files.
4.1. Exporting CVE data from the vulnerability service
Perform the following steps to export select data from the vulnerability service.
- Navigate to the Red Hat Enterprise Linux > Vulnerability > CVEs page and log in if necessary.
- Apply filters and use the sorting functionality at the top of each column to locate specific CVEs.
- Above the list of CVEs and to the right of the Filters menu, click the Export icon, , and select Export to JSON, Export to CSV, or Export as PDF based on your download preferences.
- Select a download location and click Save.
Chapter 5. Reference materials
To learn more about the vulnerability service, or other Insights for Red Hat Enterprise Linux services and capabilities, the following resources might also be of interest: