Software Secure Workload
Activity Configure

Create a Policy to Quarantine Vulnerable Workloads

You can:

  • Create policies in advance, to automatically quarantine workloads with specific known vulnerabilities or a vulnerability severity threshold you specify.

  • Create policies, to immediately quarantine workloads with detected known vulnerabilities that you deem sufficiently problematic.

This topic outlines the process for doing either.

Before you begin

Look at the View Vulnerability Dashboard to see what policies are required.

Procedure

1

Create an inventory filter that defines the vulnerabilities or the vulnerability severity threshold that you want to quarantine:

  1. From the navigation bar at the left of the window, choose Organize > Inventory Filters.

  2. Click Create Inventory Filter

  3. Click the (i) button beside Query and enter CVE to see the relevant filter options.

  4. Enter filter criteria that determine which workloads you wish to quarantine.

  5. Be sure Restrict query to ownership scope is NOT selected.

2

Create a policy to quarantine affected workloads:

For general instructions, see Manually Create Policies.

Recommendations:

  • Create the policy in your Internal or other scope near the top of your scope tree.

  • The policy should be an Absolute policy unless you want to allow exceptions. Be sure to create policies to address any exceptions.

  • Create separate policies for consumer and provider.

  • Set the priority of each policy to a low number so it will be hit before other policies in the list.

  • Set the action to Deny.

3

Review, analyze, and enforce the policy or policies.

What to do next

Create an alert so you are notified when traffic hits this policy so you can remediate the problem and restore traffic to the vulnerable workload. See Configure Alerts.