Jump to content

Search the Community

Showing results for tags 'aws security hub'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General
    • General Discussion
    • Artificial Intelligence
    • DevOpsForum News
  • DevOps & SRE
    • DevOps & SRE General Discussion
    • Databases, Data Engineering & Data Science
    • Development & Programming
    • CI/CD, GitOps, Orchestration & Scheduling
    • Docker, Containers, Microservices, Serverless & Virtualization
    • Infrastructure-as-Code
    • Kubernetes & Container Orchestration
    • Linux
    • Logging, Monitoring & Observability
    • Security, Governance, Risk & Compliance
  • Cloud Providers
    • Amazon Web Services
    • Google Cloud Platform
    • Microsoft Azure

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


LinkedIn Profile URL


About Me


Cloud Platforms


Cloud Experience


Development Experience


Current Role


Skills


Certifications


Favourite Tools


Interests

Found 4 results

  1. Today, AWS Security Hub announces the release of the AWS Resource Tagging standard. The standard contains 85 new controls which can be used to identify if any of your AWS Resources are missing tag keys required by your organization. With the release of this standard, Security Hub now offers 386 security controls that automatically check the compliance of your AWS resources against pre-defined security principles and best practices. View the full article
  2. This is a warning about AWS Security Hub. Organizations that use AWS Security Hub to monitor and mitigate risks pay too much attention to the visible part of the AWS security iceberg, namely the findings. These organizations tend to overlook or underestimate the invisible part of the iceberg where critical risks are hidden. /images/2022/05/iceberg.jpg Below, I go into the details of my observations and outline possible countermeasures to ensure you are using AWS Security Hub in the right way. Overwhelming amount of findingsThe AWS Security Hub comes with controls for the following standards: CIS AWS Foundations: 48 controls Payment Card Industry Data Security Standard (PCI DSS): 49 controls AWS Foundational Security Best Practices: 162 controls It is not uncommon that you will end up with hundreds or even thousands of findings after enabling one or multiple standards for multiple AWS accounts with running workloads. Working through a huge list of findings to evaluate, suppress, or fix the issue is demotivating and uses up a lot of energy and attention. /images/2022/05/securityhub-findings.png I’ve seen teams spend weeks or months fixing all the findings generated by AWS Security Hub. Don’t get me wrong, fixing the findings will improve overall security. My point is that you may be overlooking important areas where security can be significantly enhanced by spending the same time and money. A few ideas to avoid getting overwhelmed by the number of findings generated by the AWS Security Hub. Do not enable all security standards at once. For example, start with the CIS AWS Foundations standard. Enable and monitor the AWS Security Hub at the beginning of a project before creating resources in the AWS account. Disable irrelevant or outdated controls. Also, disable controls generating a lot of minor findings. Superficial security controlsBefore the AWS Security Hub was a thing, I worked on a similar tool many years ago. The challenge when designing and implementing controls is abstraction and generalization. To evaluate the risk of a configuration, context is needed. Let me illustrate this with an example. A Lambda function assumes an IAM role with the following policy attached. { "Version": "2012-10-17", "Statement": [ { "Action": [ "s3:CreateBucket", "s3:DeleteBucket", "s3:DeleteObject", "s3:GetObject", "s3:PutObject" ], "Effect": "Allow", "Resource": "*" } ] } A generic control cannot tell whether the IAM policy follows the least privilege principle because it does not know the Lambda function. The IAM policy could either be fine or add an unnecessary risk of accidental or malicious data deletion. That’s why the controls focus on generic risks that are easy to detect. So it is crucial that you ask the question: Which parts of the iceberg are not covered by AWS Security Hub? Let me give you a few examples: Do resource- and identity-based policies follow the least privilege principle. Are the security group rules as strict as possible? Is the ALB publicly accessible by intention? Should objects be protected from being manipulated or deleted by enabling S3 Object Lock? What’s the data classification of the data stored in a database cluster? Is encryption with a customer-managed KMS key required? Does that Lambda function (Node.js) contain a package with a critical vulnerability? Be aware that the AWS Security Hub does not check all relevant aspects of cloud security. Also, it is impossible to evaluate rules based on context information like the data classification, for example. That does not mean the service is terrible; it is just not possible to go into the details with generic controls. Some might argue, that other AWS services or 3rd parties could jump in and provide advanced controls. For example, the IAM Access Analyzer compares CloudTrail logs with IAM polices to make suggestions on how to improve the policy. However, the IAM Access Analyzer comes with the same limitation, it does not know about your scenario. Instead, it makes guesses based on incomplete/expensive CloudTrail logs. In my opinion, all those tools try to solve a problem, that cannot be solved without any context information about the scenario. Some ideas on avoiding blind spots when using the AWS Security Hub. Be aware that the AWS Security Hub does not cover all relevant aspects of cloud security. Ask AWS security specialists to review AWS accounts regularly. Validate whether IAM and network configuration follows the least privilege principle. False-positivesWe use the AWS Security Hub to evaluate the security risks within our AWS accounts. Every day, marbot -our chatbot- forwards a Security Hub finding to one of our Slacks channels. The finding tells us that there is an EC2 instance with a public IP address running. /images/2022/05/securityhub-finding-marbot.png Running an EC2 instance with a public IP address should raise a red flag. However, we have a good reason to start an EC2 instance with public IP once a day for 5 minutes. Thus, the finding is a false positive. The problem with false positives is that we get used to them. I close the warning every day, and it has happened to me that I have overlooked an important warning. So, watch out for false positives and mark them as SUPPRESSED, which means you reviewed the finding and do not think any action is needed. In our case, a new finding gets generated every day because we are launching a new instance. That’s why automatically suppressing the finding is on our TODO list. A few ideas to ensure you do not get bothered by false positives and avoid alert fatigue. Mark false-postives as SUPPRESSED (see Setting the workflow status for findings) manually. Use a Lambda function to mark false positives as SUPPRESSED in case new resources result in findings regularly. SummaryThink of AWS security as an iceberg. The easy-to-find risks look out of the water, and AWS Security Hub will easily detect them. But under the water, the iceberg continues; critical vulnerabilities are hiding there. Therefore, here are a few tips for dealing with the AWS Security Hub. Avoid generating an overwhelming amount of findings. For example, do not enable all standards and controls at once. Be aware that the AWS Security Hub does not cover all relevant aspects of cloud security. The generic controls do not guarantee that you are following the least-privilege principle, for example. Reduce the noise generated by false positives to avoid alert fatigue. Mark findings as SUPPRESSED manually or automatically. View the full article
  3. AWS Security Hub has improved how we display details for security standards, which are collections of automated security checks based on industry and regulatory frameworks like the Center for Internet Security's (CIS) AWS Foundational Benchmarks, the Payment Card Industry Data Security Standard (PCI DSS), and AWS's own Foundational Security Best Practices. We have implemented a new tabular view that makes it easier to understand your security posture relative to the security checks you have enabled in Security Hub. We have removed the legacy cards view for standards, so you will now see a visual summary of all your security checks and a count of how many checks have passed or failed. The controls table will show you at a glance the count of failed, unknown, passed, and disabled controls in the standard. Because the controls are grouped by status, you can more easily focus on failed controls. You can filter and search the controls to pinpoint specific resource types and can also sort using any of the table columns. You can now see the security score for a standard in the standard's page alongside its controls. View the full article
  4. AWS Security Hub is now integrated with AWS Audit Manager, which helps simplify how you assess risk and monitor your compliance with regulations and industry standards. AWS Audit Manager is a new service that helps you continuously audit your AWS usage and automates evidence collection to make it easier for you to assess whether your policies, procedures, and activities are operating effectively. Using a prebuilt or customized framework, you can launch an Audit Manger assessment to begin collecting and organizing evidence, such as Security Hub findings, in accordance with the requirements of an industry standard or regulation, such as the Payment Card Industry Data Security Standard (PCI DSS) or the Center for Internet Security (CIS) AWS Foundations Benchmark standard. With Audit Manager, you can focus on reviewing the relevant evidence to ensure your controls are working as intended and build audit-ready reports with much less manual effort. For more information on AWS Audit Manager, see their documentation here. View the full article
  • Forum Statistics

    43.9k
    Total Topics
    43.4k
    Total Posts
×
×
  • Create New...