Skip to content

Commit fac8d16

Browse files
authored
Update security-hub.md
1 parent 6152df4 commit fac8d16

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

docs/integrations/amazon-aws/security-hub.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ To write a query and create a scheduled search, do the following:
136136
| ComplianceStatus | Results of a compliance check. This is an optional field and its value should be one of the following: PASSED/WARNING/FAILED/NOT_AVAILABLE. |
137137
1. The `aws_account_id` field in the search results.
138138
1. `AWS_ACCOUNT_ID` set as a Lambda environment variable.
139-
1. The `account_id` where the lambda function is running.
139+
1. The `account_id` where the Lambda function is running.
140140

141141
The `aws_account_id` defaults to the account in which Lambda is running.
142142

@@ -157,11 +157,11 @@ In the case of a problem, perform the following tasks to discover the cause.
157157
}
158158
```
159159
2. Check for `status code 200` in the response body to verify whether the API Gateway and Lambda integration is working correctly. For more information on how to test API Gateway with console refer these [docs](https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-test-method.html).
160-
3. Monitor scheduled search logs using following query in Sumo Logic. This verifies whether the scheduled search was triggered or not.
160+
3. Monitor scheduled search logs using the following query in Sumo Logic. This verifies whether the scheduled search was triggered or not.
161161
```json
162162
_view=sumologic_audit "Scheduled search alert triggered" <webhook_name>
163163
```
164-
4. Check the CloudWatch logs for the Lambda function. Sumo saves Lambda function logs to CloudWatch in a log group: `/aws/lambda/<function_name>`. Check this log for any errors during lambda execution.
164+
4. Check the CloudWatch logs for the Lambda function. Sumo Logic saves Lambda function logs to CloudWatch in a log group: `/aws/lambda/<function_name>`. Check this log for any errors during lambda execution.
165165

166166
## Collecting findings for the AWS Security Hub CSPM app
167167

@@ -182,7 +182,8 @@ To create an HTTP source in Sumo Logic, see [HTTP Logs and Metrics Source](/docs
182182

183183
#### Step 2: Configure EventBridge API destination
184184

185-
1. Open your Amazon EventBridge Console.
185+
Follow the steps below to configure the EventBridge API destination:
186+
1. Open your [Amazon EventBridge Console](https://us-east-1.console.aws.amazon.com/events/home?region=us-east-1#/).
186187
1. In the navigation bar, click **API destinations**.
187188
1. Click **Create destination**.
188189
1. Enter a name for the API Destination.
@@ -191,12 +192,13 @@ To create an HTTP source in Sumo Logic, see [HTTP Logs and Metrics Source](/docs
191192
1. Provide a connection name.
192193
1. Keep the API Type as **Public**.
193194
1. Select **Basic (Username/Password)** in the **Authorization type**.
194-
1. Add any random values for **Username** and **Password**.
195-
1. Create the connection.
195+
1. Add any value of your choice for **Username** and **Password**.
196196

197197
#### Step 3: Create the EventBridge rule
198198

199-
1. Click **Rules** and then click **Create rule**.
199+
Follow the steps below to configure the EventBridge rule:
200+
1. Open your [Amazon EventBridge Console](https://us-east-1.console.aws.amazon.com/events/home?region=us-east-1#/).
201+
1. In the navigation bar, click **Rules**.
200202
1. Set the event source to **AWS services** and then select **Security Hub** as the AWS service.
201203
1. Select **All Events** in Event Type.
202204
1. Under **Select targets**, choose **EventBridge API destination**.
@@ -357,4 +359,4 @@ Use this dashboard to:
357359
* Analyze how they are distributed across AWS accounts.
358360
* Filter on Finding Type, Resource Type, Provider, AWS Account, Title, Category, Resource Type with the Finding details panel.
359361

360-
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/AWS+Security+Hub+CSPM/AWS+Security+Hub+CSPM+-+Resources+Affected+1.png')} alt="AWS Security Hub CSPM dashboard" />
362+
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/AWS+Security+Hub+CSPM/AWS+Security+Hub+CSPM+-+Resources+Affected+1.png')} alt="AWS Security Hub CSPM dashboard" />

0 commit comments

Comments
 (0)