AWS Certified SysOps Administrator - Associate

Domain 4 Security and Compliance

Security Hub Overview

Welcome to this lesson on AWS Security Hub. In this guide, you will learn how Security Hub centralizes security findings across your AWS environment, acting as a comprehensive cloud security posture management system. It aggregates findings from both AWS native services and third-party tools, giving you a unified view of your cloud security across multiple accounts and regions.

The image shows a digital dashboard with various charts and graphs, labeled "Security Hub," indicating it highlights security concerns in AWS.

Security Hub collects and correlates security data from several services including:

  • GuardDuty: Monitors network activity for potential threats.
  • Inspector: Identifies vulnerabilities in EC2 instances, Lambda containers, and more.
  • Macie: Scans S3 buckets for personally identifiable information (PII).
  • CloudWatch Events: Triggers automated actions based on defined events.

It also integrates with leading third-party solutions such as CrowdStrike and Palo Alto to further enhance your security posture.

The image is a diagram titled "Security Hub" showing various security tools: GuardDuty, Inspector, Macie, CloudWatch Events, Lambda, and External Security Tools.

Key Benefits

AWS Security Hub offers several key advantages:

  • Centralized View: Monitor security across all AWS accounts and regions from one unified dashboard.
  • Prioritization: Findings are categorized by severity (Critical, High, Medium, Low, Informational), enabling you to focus on the most significant threats.
  • Automation: Integrate with AWS Lambda, Step Functions, or Systems Manager to enable automated responses.
  • Compliance: Streamline auditing processes and compliance checks with built-in rule packs.
  • Scalability: Easily scale your security monitoring as your environment grows across regions and accounts.

The image is an infographic titled "Security Hub – Benefits," highlighting five benefits: Centralized view, Prioritization, Automation, Compliance, and Scalability. Each benefit is represented with an icon and a number.

For example, if a vulnerability is detected on an EC2 instance by Inspector, Security Hub aggregates the finding, prioritizes it, and triggers an EventBridge event. This event can then invoke a Lambda function to either remediate the issue or notify the appropriate teams.

The image is a flowchart illustrating a security process involving EC2, Inspector, Security Hub, EventBridge, and Lambda, showing the detection and remediation of vulnerabilities.

Furthermore, other AWS services like AWS Config and Step Functions can be seamlessly integrated into your security workflows to detect configuration changes and orchestrate complex remediation processes across multiple services.

The image is a flowchart illustrating the integration of various security tools like GuardDuty, Inspector, and Macie with AWS Security Hub, which connects to EventBridge and further integrates with services like Step Functions, Lambda, and Systems Manager.

Since Security Hub supports multi-region data aggregation, tracking security findings across diverse geographical locations becomes effortless. It leverages AWS Config to monitor configuration changes and enforce compliance rule packs. During setup, you will be prompted to enable AWS Config, choose compliance packs (such as PCI DSS, HIPAA, or various CIS benchmarks), and designate a primary administrator account.

The image illustrates a diagram of a Security Hub with multi-region aggregation, showing regions A, B, C, D, and E connected to an administrator account.

Security Findings Format

AWS Security Hub standardizes all security findings using the AWS Security Finding Format (ASFF). Below is an example of a typical finding:

{
  "AwsAccountId": "123456789012",
  "CreatedAt": "2023-07-30T12:00:00Z",
  "Description": "The S3 bucket my-bucket is publicly accessible.",
  "Title": "Public S3 Bucket",
  "Severity": {
    "Label": "HIGH",
    "Original": "8.0",
    "Normalized": 80
  },
  "Resources": [
    {
      "Type": "AwsS3Bucket",
      "Id": "arn:aws:s3:::my-bucket",
      "Region": "us-east-1",
      "Tags": {
        "Environment": "Production",
        "Department": "Engineering"
      }
    }
  ],
  "Compliance": {
    "status": "FAILED",
    "RelatedRequirements": [
      "CIS-1.2",
      "PCI-DSS-3.0"
    ]
  },
  "Remediation": {
    "Recommendation": {
      "Text": "Remove public access from the S3 bucket.",
      "Url": "https://docs.aws.amazon.com/s3/"
    }
  },
  "RecordState": "ACTIVE"
}

Additional fields such as product-specific details, user-defined attributes, verification state, confidence, and criticality might also be included, though they are not required for exam preparation.

Understanding Severity Levels

Severity ratings in AWS Security Hub assist in prioritizing remediation efforts. Each finding is assigned a severity label accompanied by a numeric value on a scale of 0 to 100. For instance:

{
  "Severity": {
    "Label": "HIGH",
    "Original": "8.0",
    "Normalized": 80
  }
}

A normalized value of 80 typically indicates a high-risk finding that demands prompt attention. Critical findings with normalized values nearing 100 require immediate action, while medium and low severities suggest issues that need attention but are not as urgent. Informational findings are generally recommendations or audit flags.

The image is a severity scale for prioritizing security findings, ranging from "Critical" to "Informational." It includes five levels: Critical, High, Medium, Low, and Informational, with a note that informational findings lack immediate threats.

The Security Hub Console

When you launch the AWS Security Hub console, you are presented with a dashboard that allows you to enable and configure various security standards. You may encounter standards such as:

  • AWS Foundational Security Best Practices 1.0
  • CIS AWS Foundational Benchmark (versions 1.2.0, 1.4, and 3.0)
  • NIST publications
  • PCI DSS checks

Once the findings are available, you can filter them by account, resource, application, or region. In addition, cross-region aggregation is configurable, ensuring streamlined monitoring across your entire AWS landscape.

The image shows a screenshot of the AWS Security Hub console, displaying security standards, assets with findings, and findings by region. It includes options for enabling standards and configuring cross-region aggregation.

Note

Security Hub's integration with AWS Config and EventBridge not only tracks configuration changes and compliance rule packs but also facilitates automated remediation using services like Lambda, Step Functions, or Systems Manager.

Thank you for exploring this lesson on AWS Security Hub. We look forward to guiding you through more advanced cloud security topics in future articles.

Watch Video

Watch video content

Previous
Demo Setting up Secrets Manager with RDS