OpenSCAP Part 3: Running Scans from the Command Line in RHEL 7

Introduction In part 1 of this series we were introduced to OpenSCAP and the process of running scans via the SCAP workbench. In part 2, we explored concepts and components that define security/vulnerability scans. In this 3rd post we are going to dive into the command line operation. Let's get started with oscap. Installing oscap In … Continue reading OpenSCAP Part 3: Running Scans from the Command Line in RHEL 7

OpenSCAP Part 2: SCAP Content for RHEL 7

Introduction In part one of the OpenSCAP series we were introduced to the basic usage of the OpenSCAP toolset. In that post we learned how to run a basic scan via the scap-workbench in a desktop environment. This post will focus on the Content, Profiles, and Targets. Content All content will be installed in the … Continue reading OpenSCAP Part 2: SCAP Content for RHEL 7

OpenSCAP Part 1: Introduction and Basic Usage for RHEL 7/CentOS 7/Fedora

Introduction OpenSCAP is a standardized compliance solution for Linux. It is comprised of policies (NIST, STIG, etc) and tooling (oscap, scap-workbench) that allow you to scan and evaluate Linux hosts in order to validate their compliance with industry defined standards. In addition to providing industry standard compliance rules, OpenSCAP also allows administrators to create custom … Continue reading OpenSCAP Part 1: Introduction and Basic Usage for RHEL 7/CentOS 7/Fedora

Red Hat OpenStack 8: Making your Undercloud Immutable

Introduction This article will show you how to block the overcloud from being deleted. Blocking Users from Deleting the Overcloud Stack First make a backup copy of /etc/heat/policy.json $sudo cp /etc/heat/policy.json /etc/heat/policy.json.orig Run the command below to see the default stacks:delete policy. $ sudo grep -m1 stacks:delete /etc/heat/policy.json"stacks:delete": "rule:deny_stack_user", Then, make it so that we … Continue reading Red Hat OpenStack 8: Making your Undercloud Immutable

RHEL 7 Two-Factor SSH Via Google Authenticator

In this post,  I am going to walk you through the process of installing and configuring two- factor SSH authentication via Google Authenticator. My base system is running a fresh install of RHEL 7.2 Installation Steps The first step on my system was to install autoreconf, automake, and libtool. These packages are required by the bootstrap.sh script that … Continue reading RHEL 7 Two-Factor SSH Via Google Authenticator

Redhat Satellite 5: How to Clone Security Errata to a Software Channel

Redhat Satellite 5: How to Clone Security Errata to a Software Channel. First check to see if the errata is available to your local satellite server. To accomplish this log into your organizations satellite server and click on the "Errata" tab. Then on the left side of the page click on "Advanced Search".

Mastering Auditd: A Guide to Linux Auditing

Auditd is the userland piece of the RHEL audit tool suite. When its up and running, audit messages sent by the kenel will be send to log files that you have configured. By default, only a small and limited number of messages will be picked up by Auditd; these are mostly messages related to authentication and authorization.