Meltdown, Spectre and Security Automation

January 26, 2018 by Mark Phillips

Keeping computer systems secure is one of those never ending tasks. You could be forgiven for thinking of it like "Painting the Forth Bridge". Most of the time it's 'put new software' in place, and you're good. Every now and then it’s, well, a bit more complicated.

The first week of January saw two flaws announced, called “Meltdown” and “Spectre.” Both involved the hardware at the heart of more or less every computing device on the planet – the processor. There is a great in-depth review of the two flaws here. You can also find some additional information in this blog by Red Hatter Jon Masters.

In the complex world of IT, keeping on top of security can be less painful with the help of an easy automation tool. One of our Ansible engineers, Sam Doran, has written a couple of Ansible plays to patch systems. While Meltdown and Spectre are not completely mitigated, we'd like to share these plays with you to demonstrate how to easily deploy the patches that are available; you can find them here:

If you make any improvements to them we'd welcome pull requests!

Share:

Topics:
Security Automation


 

Mark Phillips

Mark Phillips is a UK-based Product Manager. With almost a quarter of a century of industry experience, he has designed and engineered automated infrastructures at every level - from a handful of hosts in startups, to the tens of thousands in investment banks. You can follow him on twitter at @thismarkp.


rss-icon  RSS Feed

Ansible Tower by Red Hat
Ansible Fest Austin 2018
Learn About Ansible Tower