AnsibleAutomates AnsibleForSecurityAutomation
AnsibleAutomates AnsibleForSecurityAutomation
Adam Miller
Principal Software Engineer
Ansible Core Engineering
INFO SEC AREAS
Application Security
Network Security
Forensics
Incident Response
Penetration Testing
Fraud Detection and Prevention
Governance, Risk, Compliance
2
FreeImages.com/kovik
SECURITY VS OPERATIONS
SEC vs OPS
5
FreeImages.com/kovik
WHY?
No special coding skills needed Configuration management Uses OpenSSH and paramiko
Get productive quickly Manage ALL IT infrastructure More efficient & more secure
WHY ANSIBLE FOR SECURITY AUTOMATION?
+ != 0
14
SYSTEM HARDENING
COMPLIANCE
21
STIG - NETWORK
- hosts: ios
connection: local
The network element must only tasks:
allow management connections for
- name: Create management ACL
administrative access from hosts residing in
to the management network. ios_config:
parents: ip access-list mgmnt
before: no ip access-list mgmnt
Configure an ACL or filter to restrict lines:
ACL or filter
management access to the device from only - 10 permit ip host 192.168.1.99 log
the management network.
- 20 permit ip host 192.168.1.121 log
management network
23
PCI DSS
25
REMEDIATION
REMEDIATION
Protect against CVE-2016-5696
tasks:
- name: CVE-2016-5696 | Limit TCP challenge ACK limit
sysctl:
name: net.ipv4.tcp_challenge_ack_limit
value: 999999999
sysctl_set: yes
27
REMEDIATION
Fix and test shellshock
29
AUDITING AND REPORTING
SCAP
● OpenSCAP
○ An implementation of SCAP
○ Scans
○ Audits
○ Provides remediation recommendations/instructions
○ Defacto-standard in opensource/Linux land
○ https://www.open-scap.org/
● OpenSCAP + Ansible
○ OpenSCAP can audit and generate Ansible Playbooks for remediation
○ https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/securi
ty_guide/sect-using_openscap_with_ansible
INTRODUCING
ANSIBLE SECURITY AUTOMATION
WHAT IS IT?
34
IDS/IPS
ENTERPRISE
SIEM FIREWALLS
SECURE WEB
NAC
THREAT GATEWAYS
INTELLIGENCE
PLATFORMS
35
WHAT DOES IT DO?
Through Ansible Security Automation, IT organizations can address multiple popular use cases:
● For detection and triage of suspicious activities, for example, Ansible can automatically enable
logging or increase the log verbosity across enterprise firewalls and IDS to enrich the alerts received
by a SIEM for an easier triage.
● For threat hunting, for example, Ansible can automatically create new IDS rules to investigate the
origin of a firewall rule violation, and whitelist those IP addresses recognized as non threats.
● For incident response, for example, Ansible can automatically validate a threat by verifying an IDS
rule, trigger a remediation from the SIEM solution, and create new enterprise firewall rules to
blacklist the source of an attack.
36
WHO IS IT FOR?
Ansible Security Automation extends the Ansible agentless, modular and easy to use
enterprise automation platform to support the following industry constituencies:
37
THANK YOU
Adam Miller
Principal Software Engineer
Ansible Core Engineering
maxamillion
maxamillion
@TheMaxamillion