RedHat Insights Connector
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the Tenable FedRAMP Product Offering.
Red Hat® Insights continuously analyzes platforms and applications to predict risk, recommend actions, and track costs so enterprises can better manage hybrid cloud environments. Insights is included with almost every subscription to Red Hat Enterprise Linux®, Red Hat OpenShift®, and Red Hat Ansible® Automation Platform.
Connector Details
Details | Description |
---|---|
Supported products |
|
Category |
Endpoint Security |
Ingested data |
Assets and Findings |
Ingested Asset Classes |
Devices |
Integration type |
UNI directional (data is transferred from the Connector to Tenable Exposure Management in one direction) |
Supported version and type |
SaaS (latest) |
Prerequisites and User Permissions
Before you begin configuring the connector, make sure to:
-
Generate RedHat Client ID and Secret:
-
Navigate to the Red Hat Console at https://console.redhat.com/iam.
-
Navigate to Service Accounts and click on Create service account.
-
Type a Service Account Name and provide a Short Description for the account.
-
Click Create.
-
Save the Client ID and Client secret, as you won't be able to view them again. Check the box indicating you have done so and click Close.
-
-
Create a Redhat Group with the required access permissions:
-
Navigate to User Access > Groups and select Create group.
-
Type a Group Name (e.g. 'em-api-group').
-
Click Next.
-
In the roles assignment step, in the search box, type viewer, and select the appropriate API roles:
-
Inventory Host viewer
-
Vulnerability viewer
-
Patch viewer
-
-
Click Next.
-
On the Add members page, click Next.
-
On the Review details page, click Submit.
-
Click Exit.
-
Add a Connector
To add a new connector:
-
In the left navigation menu, click Connectors.
The Connectors page appears.
-
In the upper-right corner, click
Add new connector.
The Connector Library appears.
-
In the search box, type the name of the connector.
-
On the tile for the connector, click Connect.
The connector configuration options appear.
Configure the Connector
To configure the connector:
-
(Optional) In the Connector's Name text box, type a descriptive name for the connector.
-
(Optional) To use a preconfigured on-prem connector to connect to this connector, from the Gateway drop-down, select the on-prem connector you want to use for the connector. Otherwise, select Don't use gateway.
Note: For information about configuring a gateway, see Tenable On-Prem Connector. -
In the Client ID and Client Secret text boxes, paste the client credentials you generated in Red Hat.
-
In the Data pulling configuration section, you can configure dynamic settings specific to the connector.
-
In the Asset Retention text box, type the number of days after which you want assets to be removed from Tenable Exposure Management. If an asset has not been detected or updated within the specified number of days, it is automatically removed from the application, ensuring your asset inventory is current and relevant.
Tip: For more information, see Asset Retention. -
(Optional) From the drop-down menu, you can choose to automatically remove assets that reach a certain asset status, for example, Stale.
-
-
In the Test connectivity section, click the Test Connectivity button to verify that Tenable Exposure Management can connect to your connector instance.
-
A successful connectivity test confirms that the platform can connect to the connector instance. It does not, however, guarantee that the synchronization process will succeed, as additional syncing or processing issues may arise.
-
If the connectivity test fails, an error message with details about the issue appears. Click Show tests for more information about the exact error.
-
-
In the Connector scheduling section, configure the time and day(s) on which you want connector syncs to occur.
Tip: For more information, see Connector Scheduling. -
Click Create. Tenable Exposure Management begins syncing the connector. The sync can take some time to complete.
-
To confirm the sync is complete, do the following:
-
Navigate to the Connectors page and monitor the connector's status. Sync is complete once the connector status is Connected.
-
View the sync logs for the connector to monitor the logs for a successful connection.
-
Red Hat Insights in Tenable Exposure Management
Locate Connector Assets in Tenable Exposure Management
As the connector discovers assets, Tenable Exposure Management ingests those devices for reporting.
To view assets by connector:
-
In Tenable Exposure Management, navigate to the Assets page.
-
In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view assets.
The asset list updates to show only assets from the selected connector.
-
Click on any asset to view Asset Details.
Locate Connector Weaknesses in Tenable Exposure Management
As the connector discovers weaknesses, Tenable Exposure Management ingests those weaknesses for reporting.
To view weaknesses by connector:
-
In Tenable Exposure Management, navigate to the Weaknesses page.
-
In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view weaknesses.
The weaknesses list updates to show only weaknesses from the selected connector.
-
Click on any weakness to view Weakness Details.
Locate Connector Findings in Tenable Exposure Management
As the connector discovers individual findings, Tenable Exposure Management ingests those findings for reporting.
To view findings by connector:
-
In Tenable Exposure Management, navigate to the Findings page.
-
In the Filters section, under 3rd Party Connectors, click the connector name for which you want to view findings
The findings list updates to show only assets from the selected connector.
-
Click on any asset to view Finding Details.
Data Mapping
Exposure Management integrates with the connector via API to retrieve relevant weakness and asset data, which is then mapped into the Exposure Management system. The following tables outline how fields and their values are mapped from the connector to Exposure Management.
Device Mapping
Tenable Exposure Management UI Field |
RedHat Insights Field |
---|---|
Unique Identifier | id |
Asset - Name | display_name |
Asset - Operating Systems | system_profile.operating_system.name |
Asset - IPv4 Adresses Asset - IPv6 Adresses |
ip_addresses |
Asset - First Observation Date | created |
Asset - Last Observed At | Asset - Last Observed At updated |
Asset - Host Fully Qualified DNS | fqdn |
Asset - MAC Addresses | mac_addresses |
Asset - External Tags |
attributes.tags groups.name |
Asset Custom Attributes |
"redhat_uuid": id "ansible_hostname": "ansible_host or fqdn "system_state": systemd.state, "infrastructure_type": system_profile.infrastructure_type "cloud_provider": system_profile.cloud_provider, "bios_vendor": system_profile.bios_vendor, "system_memory_bytes": system_profile.system_memory_bytes |
Finding Mapping
Tenable Exposure Management UI Field |
RedHat InsightsField |
---|---|
Unique Identifier | asset id + unique vulnerability id |
Finding Name | cve_id |
CVEs | cve_id |
Severity Driver | cvss3_score |
Description | description |
First Seen | first_reported |
Last seen (Observed) | last_evaluation |
Finding Custom Attributes |
rule_id rule_description rule_error_key rule_vulnerability public_date impact business_risk |
Finding Status Mapping
Tenable Exposure Management Status |
RedHat Insights Status |
---|---|
Active |
Not Reviewed (0), In-Review (1), On-Hold (2), Scheduled for Patch (3), No Action - Risk Accepted (5) |
Fixed |
Resolved (4), Resolved via Mitigation (e.g. done without deploying a patch) (6) |
Note:For RedHat Insights, Exposure Management uses the status_id field to determine finding status.
Finding Severity Mapping
Tenable Exposure Management Severity |
ReHat Insights Score |
---|---|
Critical |
CVSS: 9.0 - 10.0 |
High |
CVSS: 7.0 - 8.9 |
Medium |
CVSS: 4.0 - 6.9 |
Low |
CVSS: 1-3.9 |
None |
CVSS:0 |
Note:For RedHat Insights, Exposure Management uses the cvss3_score field to determine severity.
Status Update Mechanisms
Every day, Tenable Exposure Management syncs with the vendor's platform to receive updates on existing findings and assets and to retrieve new ones (if any were added).
The table below describes how the status update mechanism works in the connector for findings and assets ingested into Tenable Exposure Management.
Update Type in Exposure Management |
Mechanism (When?) |
---|---|
Archiving Assets |
|
Change a Finding status from "Active" to "Fixed" |
|
API Endpoints in Use
/api/inventory - v1 /api/vulnerability - v1 /api/patch - v3
API |
Use in Tenable Exposure Management |
Required Permissions |
---|---|---|
https://sso.redhat.com/auth/realms/redhat-external/protocol/openid-connect/token |
Authentication |
- |
/api/inventory/v1/hosts |
Assets |
Inventory Hosts Viewer |
/api/vulnerability/v1/vulnerabilities/cves |
Detections |
Vulnerability viewer |
/api/vulnerability/v1/cves/{{cve_id}}/affected_systems |
Additional asset data Findings |
Vulnerability viewer |
Data Validation
This section shows how to validate and compare data between Tenable Exposure Management and the RedHat Insights platform.
Asset Data Validation
Objective: Ensure that the number of assets in RedHat Insights aligns with the number of assets displayed in Exposure Management.
In RedHat Insights:
-
Navigate to Inventory > Systems.
-
Review the total number of systems shown.
-
If the Exposure Management connector is configured to archive assets based on their status, ensure all status types are selected during validation.
In Tenable Exposure Management:
-
Compare the total number of assets between RedHat and Tenable Exposure Management.
Expected outcome: All systems visible in RedHat Insights (with eligible statuses) should appear in Exposure Management. The numbers may not match if assets are archived based on status or last seen date.
If an asset is not visible in Exposure Management, check the following conditions:
-
The asset status changed to one of the selected statuses defined in the Asset Retention configuration.
-
The asset was archived based on the last observed date (last seen).
Finding Data Validation
Objective: Ensure that the number of findings in RedHat Insights aligns with the number of findings in Exposure Management.
In RedHat Insights (from the vulnerability perceptive):
-
Navigate to Security > Vulnerability > CVEs.
-
Click on a specific CVE.
-
Apply the following filters:
-
Systems: Set to “1 or more”.
-
Advisory: Ensure no advisory filter is applied.
-
Status: Select the following values: Not reviewed, In review, On-hold, Scheduled for patch, and No Action - Risk Accepted.
All systems affected by the CVE are displayed. These represent the finding connections.
-
In RedHat Insights (from the asset perceptive):
-
Navigate to Inventory > Systems.
-
Click on a specific system.
-
Click on the Vulnerabilities tab.
-
Ensure no advisory filter is not applied.
All CVEs affecting the system are displayed. These represent the system’s findings.
In Tenable Exposure Management:
-
Compare the total number of findings between RedHat Insights and Tenable Exposure Management.
Expected outcome: The total numbers returned in RedHat Insights and Exposure Management should match.
If a finding is missing from Exposure Management or no longer active, check the following conditions:
-
The finding is marked as Fixed and appears under the Fixed state on the Findings screen.
-
The finding no longer appears because its related asset was archived.
Tip: To learn more on how assets and findings are archived or change status, see Status Update Mechanisms.