SlideShare a Scribd company logo
S103174 - Automating security compliance for
physical, virtual, cloud, and container environments
Using Red Hat CloudForms, Red Hat Satellite, Red Hat Insights and Ansible Tower by Red Hat
Lucy Huh Kerner
Principal Technical Marketing Manager - Security, Red Hat
May 4, 2017
Why automate security compliance?
“81% of hacking-related breaches leveraged
either stolen and/or weak passwords.”
2017 Verizon Data Breach Investigations Report
[http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017]
Let’s manually ensure security compliance …..
● 3 ring binder of security checks and
fixes that have to be done
● Very time consuming
● Highly prone to human error
● Tedious and boring
● Non-repudiable
● Not easy to do audits
● Not repeatable or sharable
Instead, what you want is ...
● Centralized management of your entire heterogeneous infrastructure
○ You can’t control what you don’t know about
● Automation, Automation, Automation
● Infrastructure and Security as code
○ Repeatable, sharable, verifiable, easier to do compliance audits
● Hardened, Security compliant host at provisioning time
○ Immutable Operating System: OS can’t be changed by untrusted
parties
● Automated monitoring and fixing of all systems for entire lifecycle
● Proactive vs Reactive security
What tools can I use to help me with all
this ?
Let’s start with SCAP. But, what is SCAP ?
● Security Content Automation Protocol
● Managed by National Institute of Standards and Technology (NIST)
● Standardized way of maintaining security of systems
○ Vulnerability and configuration security baselines
WHAT IS OpenSCAP?
NIST validated and certified SCAP scanner by Red Hat
Ships FREE with
RHEL and Satellite !!!
Configuration and
Vulnerability Scanner
Automating security compliance for physical, virtual, cloud, and container environments with Red Hat CloudForms, Red Hat Satellite, Red Hat Insights, and Ansible Tower by Red Hat
SCAP Workbench
● GUI tool that serves as an SCAP scanner and provides tailoring
functionality for SCAP content, but only scans a single machine
But… I don’t just have 1 machine ...
● We have over 1000 linux hosts all living in different
environments(VmWare vCenter, Microsoft Azure, etc). How do we
scan, report on, and remediate all of these systems?
● How do we provide a customized self service portal for users to
provision a security compliant host at provisioning time while still
having tight control over our entire infrastructure?
● How do we do ongoing automated security compliance and
remediation for our entire heterogeneous infrastructure?
● How do I ensure that all the 200+ container images in our
environment and all future container images that will enter our
environment are free of vulnerabilities in an automated fashion?
The secret is to use a combination of …..
Using Red Hat’s management products +
OpenSCAP, how do I:
1) Create a security compliant host at provisioning time
2) Automate ongoing security compliance
3) Ensure governance and Control
4) Do proactive vs reactive security with Red Hat Insights
**All in a heterogeneous infrastructure with a mix of
physical, virtual , cloud, and container environments **
Creating a security compliant host at
provisioning time with
Red Hat CloudForms and Ansible Tower
15
Unified Management with Red Hat CloudForms
CONTAINERS
PRIVATE CLOUD PUBLIC CLOUDVIRTUALIZATION
SOFTWARE DEFINED NETWORKING
VMware©
Microsoft©
Hyper-V
Red Hat Virtualization
Amazon©
Web Services
Microsoft Azure
Google©
Cloud Platform
Red Hat Openstack©
Platform
Red Hat©
OpenShift Container Platform
Service
Management
Compliance
& Governance
Efficiency
& Optimization
CloudForms includes Ansible
Inside (default automation for
CloudForms)
DEMO #1
Creating a security compliant host at provisioning time
1. Push an order button in CloudForms which, behind the scenes will:
○ Provision a VM in VmWare
○ Register it with Satellite
○ Make it compliant to the Defense Information Systems Agency(DISA)
Security Technical Implementation Guide (STIG)
2. Do all this WITHOUT writing a single line of code and WITH multi-tenancy
○ Users from different tenants have their own “order buttons”
3. Admin has tight control of entire heterogenous infrastructure and only allows
certain people provision in Amazon vs VMWare based on tenancy, utilization, etc
Now, let’s see this in action!
You can also create a security compliant
host in RHEL 7.2, RHEL 7.3 + Satellite 6
Of course, can
kickstart too or create
security compliant
host(s) using
Satellite 6 as well vs
RHEL GUI install.
Automating ongoing security
compliance with
Red Hat CloudForms, Satellite,
OpenSCAP, and Ansible Tower
DEMO #2
Automate ongoing security compliance
1. Push a button on a VM in CloudForms and do an OpenSCAP scan on it for a chosen
security profile (PCI-DSS, DISA STIG, Standard, etc or your custom profile)
○ When the scan PASSES:
i. Tag the VM as scap-compliant:<name of profile>
○ When the scan FAILS:
i. Tag the VM as scap-noncompliant:<name of profile>
ii. Email owner of VM
iii. Open a ticket in a ticketing system, such as ServiceNow with the name of
the failed VM and all other details about VM(size, IP address,etc)
2. Create reports of ALL scap-compliant/non-compliant VMs based on security profile
3. Push a button to fix the VM based on security profile. Once that looks good, do the
fix for ALL machines in my environment at the push of a button.
Now, let’s see this in action!
The Power and Flexibility of the
Red Hat CloudForms control/policy
engine
DEMO #3
Power and Flexibility of the CloudForms control engine
1. Check to see if your VM is vulnerable to shellshock. If yes, then fix the VM using a
button in CloudForms that launches an Ansible playbook to remediate the VM
against the shellshock vulnerability.
2. In CloudForms, check to see if an Openshift container image has any severity high
vulnerabilities. If yes, then Openshift will prevent that vulnerable image from ever
running in Openshift again.
Now, let’s see this in action!
Proactive Security and Automated
Risk Management with Red Hat Insights
wnix - Red Hat Insights
RED HAT MANAGEMENT
BUILD A TRUSTED & SECURE
RED HAT ENVIRONMENT
Manage the Red Hat Lifecycle
Provision & Configure at Scale
Standardize Your Environment
DELIVER SERVICES ACROSS
YOUR HYBRID CLOUD
Hybrid Cloud Management
Self-Service Provisioning
Policy-driven Compliance
AUTOMATE YOUR IT
PROCESSES & DEPLOYMENTS
Simple & powerful language
No agents to install
Scale with Ansible Tower
PREVENT CRITICAL ISSUES
BEFORE THEY OCCUR
Continuous Insights
Verified Knowledge
Proactive Resolution
Insights introduces automated risk management,
reduces complexity, and allows you to FIX faster.
DEMO #4
Proactive Security with Red Hat Insights
1. See the payload injection issue on your VM in Red Hat Insights from either Satellite
or CloudForms.
○ Upon fixing, notice that the issue no longer exists
Now, let’s see this in action!
SUMMARY
1) Create a security compliant host at provisioning time
2) Automate ongoing security and compliance
3) Ensure governance and Control
4) Do proactive vs reactive security with Red Hat Insights
All with FLEXIBILITY + CHOICE using a combination of OpenSCAP, Red
Hat CloudForms, Red Hat Satellite, Ansible Tower, and Red Hat Insights
Automating security compliance for physical, virtual, cloud, and container environments with Red Hat CloudForms, Red Hat Satellite, Red Hat Insights, and Ansible Tower by Red Hat
Lucy Kerner
Principal Technical Product Marketing Manager - Security , Red Hat
lkerner@redhat.com
@LucyCloudBling
plus.google.com/+RedHat
linkedin.com/company/red-hat
youtube.com/user/RedHatVideos
facebook.com/redhatinc
twitter.com/RedHatNews
THANK YOU
plus.google.com/+RedHat
linkedin.com/company/red-hat
youtube.com/user/RedHatVideos
facebook.com/redhatinc
twitter.com/RedHatNews
Automating security compliance for physical, virtual, cloud, and container environments with Red Hat CloudForms, Red Hat Satellite, Red Hat Insights, and Ansible Tower by Red Hat

More Related Content

PDF
SS42731_v2_KernerMicene
PDF
2017 Red Hat Summit Lab: Proactive security compliance automation with Red Ha...
PDF
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
PDF
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
PPTX
SOCstock 2021 The Cloud-native SOC
PDF
NGINX Controller: faster deployments, fewer headaches
PDF
Red Hat multi-cluster management & what's new in OpenShift
PDF
Cloud Native Security: New Approach for a New Reality
SS42731_v2_KernerMicene
2017 Red Hat Summit Lab: Proactive security compliance automation with Red Ha...
Secure Foundations: Why Red Hat Enterprise Linux is not just another Linux di...
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
SOCstock 2021 The Cloud-native SOC
NGINX Controller: faster deployments, fewer headaches
Red Hat multi-cluster management & what's new in OpenShift
Cloud Native Security: New Approach for a New Reality

What's hot (18)

PDF
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
PPTX
StorageOS - 8 core principles of cloud native storage
PPTX
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
PDF
Digitální transformace: zabezpečení agilních prostředí
PDF
Service Mesh: Two Big Words But Do You Need It?
PPTX
Application Security in the Cloud - Best Practices
PDF
Monitoring a cloud native platform feature
PDF
Ravello – the Easiest Way to Cloud
PDF
Lo Scenario Cloud-Native (Pivotal Cloud-Native Workshop: Milan)
PDF
Redefining cloud native debugging
PDF
Putting Private Clouds to Work with PaaS Interop Vegas 2013 presentation by D...
PDF
VMware Developer-Ready Transformation
PDF
Using Google Cloud Services with Spring Boot and Pivotal Cloud Foundry (Pivot...
PDF
The Need of Cloud-Native Application
PDF
How to Overcome Data Challenges When Refactoring Monoliths to Microservices
PPTX
How to build the Cloud Native applications the way you want – not the way the...
PPTX
VMworld 2015: Build and Run Cloud Native Apps in your Software Defined Data C...
PDF
VMware Cloud on Amazon Web Services
Virtual Desktop Infrastructure with Novell Endpoint Management Solutions
StorageOS - 8 core principles of cloud native storage
Achieving DevSecOps Outcomes with Tanzu Advanced- May 25, 2021
Digitální transformace: zabezpečení agilních prostředí
Service Mesh: Two Big Words But Do You Need It?
Application Security in the Cloud - Best Practices
Monitoring a cloud native platform feature
Ravello – the Easiest Way to Cloud
Lo Scenario Cloud-Native (Pivotal Cloud-Native Workshop: Milan)
Redefining cloud native debugging
Putting Private Clouds to Work with PaaS Interop Vegas 2013 presentation by D...
VMware Developer-Ready Transformation
Using Google Cloud Services with Spring Boot and Pivotal Cloud Foundry (Pivot...
The Need of Cloud-Native Application
How to Overcome Data Challenges When Refactoring Monoliths to Microservices
How to build the Cloud Native applications the way you want – not the way the...
VMworld 2015: Build and Run Cloud Native Apps in your Software Defined Data C...
VMware Cloud on Amazon Web Services
Ad

Viewers also liked (11)

PDF
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
PDF
Red Hat OpenShift V3 Overview and Deep Dive
PDF
OpenStack and CloudForms Do's and Dont's
PDF
Asterisk as a Virtual Network Function Part 1
PDF
Cloudforms Workshop
PPTX
Managing open shift at scale across the open hybrid cloud
PDF
Pedal to the metal: Red Hat CloudForms for workload & infrastructure management
PDF
Integrate Openshift with Cloudforms
PDF
RHTE2015_CloudForms_Containers
PDF
PDF
Automating the Enterprise with CloudForms & Ansible
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
Red Hat OpenShift V3 Overview and Deep Dive
OpenStack and CloudForms Do's and Dont's
Asterisk as a Virtual Network Function Part 1
Cloudforms Workshop
Managing open shift at scale across the open hybrid cloud
Pedal to the metal: Red Hat CloudForms for workload & infrastructure management
Integrate Openshift with Cloudforms
RHTE2015_CloudForms_Containers
Automating the Enterprise with CloudForms & Ansible
Ad

Similar to Automating security compliance for physical, virtual, cloud, and container environments with Red Hat CloudForms, Red Hat Satellite, Red Hat Insights, and Ansible Tower by Red Hat (20)

PPTX
HCI ECOCAST
PDF
Data Center Server security
PDF
Confidential compute with hyperledger fabric .v17
PPTX
Rik Ferguson
PPTX
NSX 9 Core Use Cases
PDF
Schlomo Schapiro - Why I like to use the proprietary Cloud services without f...
PPTX
Why the cloud is more secure than your existing systems
ODP
VirtSec, and the Open Source impact
PDF
Security Spotlight: The Coca Cola Company
PDF
Qualys Corporate Brochure
PPTX
Security in the cloud Workshop HSTC 2014
PDF
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
PDF
Compliance Automation with InSpec
PPTX
Planning for MQ in the cloud MQTC 2017
PPTX
Hyper Secure Converged Infrastructure solves architectural challenges
DOCX
security report
PPTX
Virtualization Security
PDF
Security Spotlight: The Coca Cola Company - CSS ATX 2017
PPTX
Virtual Machine Introspection - Future of the Cloud
PDF
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
HCI ECOCAST
Data Center Server security
Confidential compute with hyperledger fabric .v17
Rik Ferguson
NSX 9 Core Use Cases
Schlomo Schapiro - Why I like to use the proprietary Cloud services without f...
Why the cloud is more secure than your existing systems
VirtSec, and the Open Source impact
Security Spotlight: The Coca Cola Company
Qualys Corporate Brochure
Security in the cloud Workshop HSTC 2014
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
Compliance Automation with InSpec
Planning for MQ in the cloud MQTC 2017
Hyper Secure Converged Infrastructure solves architectural challenges
security report
Virtualization Security
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Virtual Machine Introspection - Future of the Cloud
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Approach and Philosophy of On baking technology
PDF
cuic standard and advanced reporting.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Unlocking AI with Model Context Protocol (MCP)
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
cuic standard and advanced reporting.pdf
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Monthly Chronicles - July 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
Advanced methodologies resolving dimensionality complications for autism neur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...

Automating security compliance for physical, virtual, cloud, and container environments with Red Hat CloudForms, Red Hat Satellite, Red Hat Insights, and Ansible Tower by Red Hat

  • 1. S103174 - Automating security compliance for physical, virtual, cloud, and container environments Using Red Hat CloudForms, Red Hat Satellite, Red Hat Insights and Ansible Tower by Red Hat Lucy Huh Kerner Principal Technical Marketing Manager - Security, Red Hat May 4, 2017
  • 2. Why automate security compliance?
  • 3. “81% of hacking-related breaches leveraged either stolen and/or weak passwords.” 2017 Verizon Data Breach Investigations Report [http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017]
  • 4. Let’s manually ensure security compliance ….. ● 3 ring binder of security checks and fixes that have to be done ● Very time consuming ● Highly prone to human error ● Tedious and boring ● Non-repudiable ● Not easy to do audits ● Not repeatable or sharable
  • 5. Instead, what you want is ... ● Centralized management of your entire heterogeneous infrastructure ○ You can’t control what you don’t know about ● Automation, Automation, Automation ● Infrastructure and Security as code ○ Repeatable, sharable, verifiable, easier to do compliance audits ● Hardened, Security compliant host at provisioning time ○ Immutable Operating System: OS can’t be changed by untrusted parties ● Automated monitoring and fixing of all systems for entire lifecycle ● Proactive vs Reactive security
  • 6. What tools can I use to help me with all this ?
  • 7. Let’s start with SCAP. But, what is SCAP ? ● Security Content Automation Protocol ● Managed by National Institute of Standards and Technology (NIST) ● Standardized way of maintaining security of systems ○ Vulnerability and configuration security baselines
  • 8. WHAT IS OpenSCAP? NIST validated and certified SCAP scanner by Red Hat Ships FREE with RHEL and Satellite !!! Configuration and Vulnerability Scanner
  • 10. SCAP Workbench ● GUI tool that serves as an SCAP scanner and provides tailoring functionality for SCAP content, but only scans a single machine
  • 11. But… I don’t just have 1 machine ... ● We have over 1000 linux hosts all living in different environments(VmWare vCenter, Microsoft Azure, etc). How do we scan, report on, and remediate all of these systems? ● How do we provide a customized self service portal for users to provision a security compliant host at provisioning time while still having tight control over our entire infrastructure? ● How do we do ongoing automated security compliance and remediation for our entire heterogeneous infrastructure? ● How do I ensure that all the 200+ container images in our environment and all future container images that will enter our environment are free of vulnerabilities in an automated fashion?
  • 12. The secret is to use a combination of …..
  • 13. Using Red Hat’s management products + OpenSCAP, how do I: 1) Create a security compliant host at provisioning time 2) Automate ongoing security compliance 3) Ensure governance and Control 4) Do proactive vs reactive security with Red Hat Insights **All in a heterogeneous infrastructure with a mix of physical, virtual , cloud, and container environments **
  • 14. Creating a security compliant host at provisioning time with Red Hat CloudForms and Ansible Tower
  • 15. 15 Unified Management with Red Hat CloudForms CONTAINERS PRIVATE CLOUD PUBLIC CLOUDVIRTUALIZATION SOFTWARE DEFINED NETWORKING VMware© Microsoft© Hyper-V Red Hat Virtualization Amazon© Web Services Microsoft Azure Google© Cloud Platform Red Hat Openstack© Platform Red Hat© OpenShift Container Platform Service Management Compliance & Governance Efficiency & Optimization
  • 16. CloudForms includes Ansible Inside (default automation for CloudForms)
  • 18. Creating a security compliant host at provisioning time 1. Push an order button in CloudForms which, behind the scenes will: ○ Provision a VM in VmWare ○ Register it with Satellite ○ Make it compliant to the Defense Information Systems Agency(DISA) Security Technical Implementation Guide (STIG) 2. Do all this WITHOUT writing a single line of code and WITH multi-tenancy ○ Users from different tenants have their own “order buttons” 3. Admin has tight control of entire heterogenous infrastructure and only allows certain people provision in Amazon vs VMWare based on tenancy, utilization, etc
  • 19. Now, let’s see this in action!
  • 20. You can also create a security compliant host in RHEL 7.2, RHEL 7.3 + Satellite 6
  • 21. Of course, can kickstart too or create security compliant host(s) using Satellite 6 as well vs RHEL GUI install.
  • 22. Automating ongoing security compliance with Red Hat CloudForms, Satellite, OpenSCAP, and Ansible Tower
  • 24. Automate ongoing security compliance 1. Push a button on a VM in CloudForms and do an OpenSCAP scan on it for a chosen security profile (PCI-DSS, DISA STIG, Standard, etc or your custom profile) ○ When the scan PASSES: i. Tag the VM as scap-compliant:<name of profile> ○ When the scan FAILS: i. Tag the VM as scap-noncompliant:<name of profile> ii. Email owner of VM iii. Open a ticket in a ticketing system, such as ServiceNow with the name of the failed VM and all other details about VM(size, IP address,etc) 2. Create reports of ALL scap-compliant/non-compliant VMs based on security profile 3. Push a button to fix the VM based on security profile. Once that looks good, do the fix for ALL machines in my environment at the push of a button.
  • 25. Now, let’s see this in action!
  • 26. The Power and Flexibility of the Red Hat CloudForms control/policy engine
  • 28. Power and Flexibility of the CloudForms control engine 1. Check to see if your VM is vulnerable to shellshock. If yes, then fix the VM using a button in CloudForms that launches an Ansible playbook to remediate the VM against the shellshock vulnerability. 2. In CloudForms, check to see if an Openshift container image has any severity high vulnerabilities. If yes, then Openshift will prevent that vulnerable image from ever running in Openshift again.
  • 29. Now, let’s see this in action!
  • 30. Proactive Security and Automated Risk Management with Red Hat Insights
  • 31. wnix - Red Hat Insights RED HAT MANAGEMENT BUILD A TRUSTED & SECURE RED HAT ENVIRONMENT Manage the Red Hat Lifecycle Provision & Configure at Scale Standardize Your Environment DELIVER SERVICES ACROSS YOUR HYBRID CLOUD Hybrid Cloud Management Self-Service Provisioning Policy-driven Compliance AUTOMATE YOUR IT PROCESSES & DEPLOYMENTS Simple & powerful language No agents to install Scale with Ansible Tower PREVENT CRITICAL ISSUES BEFORE THEY OCCUR Continuous Insights Verified Knowledge Proactive Resolution Insights introduces automated risk management, reduces complexity, and allows you to FIX faster.
  • 33. Proactive Security with Red Hat Insights 1. See the payload injection issue on your VM in Red Hat Insights from either Satellite or CloudForms. ○ Upon fixing, notice that the issue no longer exists
  • 34. Now, let’s see this in action!
  • 35. SUMMARY 1) Create a security compliant host at provisioning time 2) Automate ongoing security and compliance 3) Ensure governance and Control 4) Do proactive vs reactive security with Red Hat Insights All with FLEXIBILITY + CHOICE using a combination of OpenSCAP, Red Hat CloudForms, Red Hat Satellite, Ansible Tower, and Red Hat Insights
  • 37. Lucy Kerner Principal Technical Product Marketing Manager - Security , Red Hat lkerner@redhat.com @LucyCloudBling plus.google.com/+RedHat linkedin.com/company/red-hat youtube.com/user/RedHatVideos facebook.com/redhatinc twitter.com/RedHatNews