Remediating Security Exposures Using the Vulnerability Service and Ansible Playbooks
Automate the Remediation of CVE Security Vulnerabilities in RHEL Environments
Abstract
Chapter 1. Creating Ansible Playbooks to remediate CVE exposures on RHEL systems
The following documentation guides vulnerability service users in creating Ansible Playbooks to automate the remediation of CVEs on RHEL systems.
There are two approaches that vulnerability service users can use, when selecting issues for remediation.
- Remediate multiple CVEs that affect a single system.
- Remediate multiple systems affected by a single CVE.
Chapter 2. Remediating multiple CVEs affecting a single system
Complete the following steps to remediate CVE exposures on a single system.
Procedure
- Navigate to the Red Hat Enterprise Linux > Vulnerability > Systems tab and log in if necessary.
- Search for a system by name or scroll through the list to locate the system you wish to remediate.
- Click on the system name to view system details and list of CVE exposures.
- Using the checkboxes to the left of the CVE name, select CVEs to repair on this system and click Remediate.
- Select Add to existing playbook or Create new playbook and provide a name, depending on your preference. Click Next.
- Verify that the information in the Remediation review is correct. By default, autoreboot is enabled. You may click on Turn off autoreboot if desired, then click Submit.
- Locate your playbook in Remediations and download the yaml file.
- Add the yaml file to your Ansible workflow.
Chapter 3. Remediating multiple systems affected by a single CVE
Complete the following steps, to remediate systems of a single CVE exposure.
Procedure
- Navigate to the Red Hat Enterprise Linux > Vulnerability > CVEs tab and log in if necessary.
- Click on a CVE to view more information about the individual CVE and scroll down to view all exposed systems.
- Select systems to remediate and click Remediate.
- Select Add to existing playbook or Create new playbook and provide a name, depending on your preference. Click Next.
- Verify that the information in the Remediation review is correct. By default, autoreboot is enabled. You may click on Turn off autoreboot if desired, then click Submit.
- Locate your playbook in Remediations and download the yaml file.
- Add the yaml file to your Ansible workflow.
Chapter 4. Reference materials
To learn more about the vulnerability service, or the other Red Hat Insights for Red Hat Enterprise Linux services, the following resources might also be of interest:
Providing feedback on Red Hat documentation
We appreciate your feedback on our documentation. To provide feedback, highlight text in a document and add comments.
Prerequisites
- You are logged in to the Red Hat Customer Portal.
- In the Red Hat Customer Portal, the document is in the Multi-page HTML viewing format.
Procedure
To provide your feedback, perform the following steps:
Click the Feedback button in the top-right corner of the document to see existing feedback.
NoteThe feedback feature is enabled only in the Multi-page HTML format.
- Highlight the section of the document where you want to provide feedback.
Click the Add Feedback pop-up that appears near the highlighted text.
A text box appears in the feedback section on the right side of the page.
Enter your feedback in the text box and click Submit.
A documentation issue is created.
- To view the issue, click the issue link in the feedback view.