Data Center Automation Ds
Data Center Automation Ds
Data Center Automation Ds
Product Highlights list of individual patches) along with any cor- Key Benefits
responding Common Vulnerability Exposure
Service Level Objective (SLO)-Based ■ Automate multi-platform patching, compliance,
(CVE) data from the National Vulnerability and provisioning to achieve high-quality,
Patch Scan and Remediation for
Database (NVD). Remediation SLOs ensure re- repeatable processes; eliminate manual errors
Multi-Vendor Server OS and hand-offs between technology silos
sources remain compliant with patch policies.
Patch Policies. Perform automated infrastruc-
ture patch scan and remediation actions using ■ Detect and remediate vulnerability and
patch policies. Policies contain measurement Static Patching. Patches can be applied using compliance risks proactively across the
vendor specific patching infrastructure and lo- data center; eliminate inconsistent patching,
and remediation Service Level Objectives intermittent compliance, and meet Service
(SLOs) and patch bundles. SLOs define the cal repositories. Create custom patch bundles
Level Objectives
frequency for automated scan and remedia- of various types (e.g., recommended, critical,
■ Standardize provisioning across multi-vendor
tion actions while resource group maintenance etc.) for multi-vendor operating systems, such
server OS and application infrastructure;
windows define when the jobs can be run. as Windows, RHEL, SOLARIS, and more. When eliminate error prone manual tasks
Resource groups are subscribed to policies, adding patches to a patch policy, patch filters
■ Native integrations with other OpenText ITOM
while resource patch bundles contain informa- allow sorting of patches based on patch re-
solutions provide a more holistic view of
tion about the type of patches included (e.g., lease date, CVSS, and more. datacenter vulnerabilities
vendor recommended patches or an explicit
■ Integrate with existing third-party toolsets via
REST APIs to achieve quicker time to value
■ Pre and post policy workflows allow for custom
process integration
Figure 1. The risk dashboard shows patch vulnerabilities and CVE data across the datacenter.
Data Sheet
Data Center Automation
Dynamic Patching. DCA queries the vendor contain benchmarks for mixed resource types can be customized to include advanced con-
specific update utilities on the target resource and can be applied to a resource group con- figurations such as RAID and BIOS settings.
to determine which patches should be applied taining multiple resource types. Configure custom scripts to be run at time of
based on vendor recommendations. build to further customize deployments. All
provisioning can be scheduled or run ad hoc.
The risk dashboard uses CVE data imported
from the NVD to identify patching vulnerabili- Provision Bare Metal. Bare metal servers can
ties across IT infrastructure. Resources are be provisioned using a PXE boot process.
evaluated for exposure to all known CVEs and Servers are PXE booted and brought under
results are displayed on the dashboard in vari- management using an agent. The customiz-
ous sections. The dashboard can be custom- able build plan is then deployed to install the
ized to show statistics including weekly impact desired OS.
trends and number of affected resources for
vulnerabilities of particular interest. Other areas Figure 2. Drilldown from dashboard showing Provision Virtual Servers. View an inventory
show key information such as most recent vul- needed patches with CVSS severity. of unmanaged VMware vCenter and Microsoft
nerabilities and affected resources, overall re- SCVMM VMs. OS build plans can be config-
source count by vulnerability status, resource ured to create a VM from a template. When an
type and count by CVE severity (e.g., 55 critical OS build plan is deployed the selected servers
CVEs on RHEL resources), and vulnerabilities are brought under management and then the
by age (e.g., 14 resources have had an ongo- desired OS is installed.
ing critical exposure for a period greater than
one year). Process Orchestration
DCA uses out-of-the-box orchestration work-
Automated, Policy-Based Compliance flows to perform DCA operations on man-
Scan and Remediation for aged multivendor OS. Orchestration flows
Multi-Vendor Server OS Figure 3. Resource management screen shows can be created as extensions to automate any
Ongoing, Policy Based Compliance. Audit patch and compliance statistics for a given resource. processes related to the provisioning, patch-
and Remediation SLOs are defined for each ing, and compliance lifecycle of a resource.
compliance policy. SLOs define the frequency Compliance Dashboard. Obtain compliance Leverage orchestration workflows to integrate
for audit and/or remediation jobs (e.g., daily, reports via dashboards available for resource with 3rd party tools and existing content, for
weekly, or monthly). Maintenance schedules groups, individual resources, and policies. example—create a workflow that updates a
are created for resource groups to establish Observe key details on compliance such as service management ticket when a compli-
the time period in which these jobs will be run compliance status (within or outside of SLOs), ance or provisioning operation is performed
(e.g., Sunday between 12:00am and 6:00am). severity, and failed benchmarks. Overall infra- on a particular resource or resource type.
structure compliance statistics and metrics are
Out-Of-The-Box (OOTB) Compliance Scan available from the central dashboard. Drill into DCA Containerized Deployment Option
and Remediation Content. Leverage pre- the dashboard for more detailed information Built on top of the ITOM Container Deployment
built compliance content for a broad range of including benchmark and resource identifica- Foundation (CDF), containerized DCA presents
popular IT, regulatory, and security compliance tion. DCA’s Collect-Once-Store-Once (COSO) new innovations for orchestrated infrastruc-
benchmarks such as CIS, PCI, DSS, SOX, ISO reporting allows you to report on historical as ture management. The ITOM CDF platform has
27001, FISMA, HIPAA, NERC, DISA, and more. well as transactional compliance data. a simple install process and once installed han-
The OOTB compliance content includes com- dles all provisioning, orchestration, and man-
pliance deployment templates and remedia- Provisioning and Configuration Features agement of the underlying core Kubernetes/
tion content. Along with its OOTB compliance Configurable Build Plans. Out-of-the-box Docker cluster infrastructure. The CDF UI is a
content, DCA allows you to create custom with customizable build plans for multi-vendor single portal used for DCA suite and CDF plat-
compliance benchmarks and policies to meet OS including but not limited to: RHEL, Solaris, form management tasks, making it easier to
any internal compliance needs. Policies can Windows, CentOS, and Ubuntu. Build plans scale and offering in-place upgrades.
2
Robust Reporting and Integrations
Integration with Operations Bridge Manager.
Out-of-the-box integration with OpenText
Oper ations Bridge Manager (OBM) allows
DCA to send compliance and vulnerability scan
data into OBM to further assess the business
service level impact of vulnerabilities on spe-
cific resources, giving a more holistic view of
the datacenter.
www.microfocus.com/opentext 3
Connect with Us
OpenText CEO Mark Barrenechea’s blog