+
+The **AWS Security Hub – OCSF** app offers a centralized, structured view into your AWS security findings using the Open Cybersecurity Schema Framework (OCSF). This app is designed to help security teams identify threats, track compliance violations, and investigate affected resources with speed and clarity.
+
+With pre-configured dashboards and in-depth visualizations, this app helps you to monitor findings by severity, region, account, and classification. You can assess security trends over time, evaluate cloud resource exposure, and analyze the effectiveness of your cloud security posture across multiple AWS services.
+
+Whether you need to investigate recent security events, track compliance gaps against key industry standards like PCI or NIST, or prioritize remediation by impacted resources, this app provides actionable insights in one place. Designed for both strategic oversight and tactical response, the app streamlines cloud security operations and supports better decision-making across teams.
+
+:::info
+This app includes [built-in monitors](#aws-security-hub---ocsf-alerts). For details on creating custom monitors, refer to [Create monitors for AWS Security Hub - OCSF app](#create-monitors-for-aws-security-hub---ocsf-app).
+:::
+
+## Log types
+
+The AWS Security Hub - OCSF app uses the [Security Hub Findings](https://docs.aws.amazon.com/securityhub/latest/userguide/security-hub-adv-ocsf-findings.html) log types.
+
+### Sample log message
+
+```json title="Findings"
+{
+ "version": "0",
+ "id": "994b02ab-3ee4-9576-abcb-6a920op2c085",
+ "detail-type": "Findings Imported V2",
+ "source": "aws.securityhub",
+ "account": "869728294964",
+ "time": "2025-07-22T03:03:15Z",
+ "region": "us-east-1",
+ "resources": [
+ "1d24e91799652d9e17025b61d94f436b20b515b6f3cd9bda788f48c1db9cf244"
+ ],
+ "detail": {
+ "findings": [
+ {
+ "activity_id": 2,
+ "activity_name": "Update",
+ "category_name": "Findings",
+ "category_uid": 2,
+ "class_name": "Detection Finding",
+ "class_uid": 2004,
+ "cloud": {
+ "account": {
+ "type": "AWS Account",
+ "type_id": 10,
+ "uid": "869728294964"
+ },
+ "cloud_partition": "aws",
+ "provider": "AWS",
+ "region": "us-east-1"
+ },
+ "comment": "John's testing",
+ "count": 264,
+ "evidences": [
+ {
+ "api": {
+ "operation": "DeleteTrail",
+ "service": {
+ "name": "cloudtrail.amazonaws.com"
+ }
+ },
+ "data": {
+ "affected_resource": {
+ "AWS::CloudTrail::Trail": "Aws-Observability-e2esumoqeui"
+ },
+ "resource_role": "TARGET"
+ }
+ }
+ ],
+ "finding_info": {
+ "analytic": {
+ "type": "Rule",
+ "type_id": 1,
+ "uid": "b4c71b47fb852d3fc0e99a82fa2841aa"
+ },
+ "created_time": 1729766226938,
+ "created_time_dt": "2024-10-24T10:37:06.938Z",
+ "desc": "AWS CloudTrail trail Aws-Observability-e2esumoqeui was disabled by cis_automation calling DeleteTrail under unusual circumstances. This can be attackers attempt to cover their tracks by eliminating any trace of activity performed while they accessed your account.",
+ "first_seen_time": 1729765286000,
+ "first_seen_time_dt": "2024-10-24T10:21:26.000Z",
+ "last_seen_time": 1753152734000,
+ "last_seen_time_dt": "2025-07-22T02:52:14.000Z",
+ "modified_time": 1753153354272,
+ "modified_time_dt": "2025-07-22T03:02:34.272Z",
+ "product": {
+ "uid": "b4c71b47fb852d3fc0e99a82fa2841aa"
+ },
+ "title": "An AWS CloudTrail trail Aws-Observability-e2esumoqeui was disabled.",
+ "types": [
+ "Stealth:IAMUser/CloudTrailLoggingDisabled"
+ ],
+ "uid": "arn:aws:guardduty:us-east-1:869728294630:detector/b4c71b47fb852d3fc0e99a82fa2841aa/finding/06c95f0cfdfd3b579b977e20e9da1aa4",
+ "uid_alt": "06c95f0cfdfd3b579b977e20e9da1aa4"
+ },
+ "metadata": {
+ "product": {
+ "name": "GuardDuty",
+ "uid": "arn:aws:securityhub:us-east-1::productv2/aws/guardduty",
+ "vendor_name": "AWS"
+ },
+ "profiles": [
+ "cloud",
+ "datetime"
+ ],
+ "uid": "1d24e91799652d9e17025b61d94f436b20b515b6f3cd9bda788f48c1db9cf244",
+ "version": "1.5.0"
+ },
+ "remediation": {
+ "desc": "Please review the remediation guidance provided in the referenced documentation",
+ "references": [
+ "https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-iam.html#stealth-iam-cloudtrailloggingdisabled"
+ ]
+ },
+ "resources": [
+ {
+ "cloud_partition": "aws",
+ "data": {
+ "access_key_id": "ASIA4U76YS3TB3MEOA3O",
+ "principal_id": "AROA4U76YS3THXXBAIOOA:aws-go-sdk-1753152318418995274",
+ "user_name": "cis_automation",
+ "user_type": "AssumedRole"
+ },
+ "name": "cis_automation",
+ "owner": {
+ "account": {
+ "type": "AWS Account",
+ "type_id": 10,
+ "uid": "869728294964"
+ }
+ },
+ "region": "us-east-1",
+ "type": "AWS::IAM::AccessKey",
+ "uid": "ASIA4U76YS3TEOA3O"
+ }
+ ],
+ "severity": "Low",
+ "severity_id": 2,
+ "status": "Suppressed",
+ "status_id": 3,
+ "time": 1753153354272,
+ "time_dt": "2025-07-22T03:02:34.272Z",
+ "type_name": "Detection Finding: Update",
+ "type_uid": 200402,
+ "vendor_attributes": {
+ "severity": "Low",
+ "severity_id": 2
+ }
+ }
+ ]
+ }
+}
+```
+
+### Sample query
+
+```sql total="Total Findings"
+_sourcecategory="yl/webhook" category_name activity_name
+| json "detail.findings[0]" as finding nodrop
+| json field=finding "finding_info.uid","finding_info.first_seen_time","finding_info.last_seen_time","finding_info.modified_time", "finding_info.modified_time_dt", "severity","cloud.account.uid","status","compliance.status","finding_info.types","cloud.region","class_name","finding_info.analytic.category","activity_name","metadata.product.name","metadata.product.vendor_name","resources[*]","finding_info.title","remediation.desc","remediation.references[0]","evidences[*].data.resource_role" as finding_id,finding_first_seen_time,finding_last_seen_time,finding_modified_time,finding_info_modified_time_dt,severity,aws_account_id,finding_status,compliance_status,finding_types,cloud_region,class_name,category_name,activity_name,product_name,vendor_name,resources,title,remediation_description,remediation_references,evidences_data_resource_roles nodrop
+| topk(1, finding_modified_time) by finding_id
+| parse regex field=resources "(?
+
+### Compliance Summary
+
+The **AWS Security Hub - OCSF - Compliance Summary** dashboard provides a focused analysis of your AWS compliance posture, aggregating finding data across key compliance standards. The dashboard highlights the failures that occurs across accounts, resources, and time, providing teams the visibility needed to assess audit readiness and take corrective action.
+
+It surfaces trends in compliance violations, enabling you to monitor status changes, detect regressions, and evaluate severity distribution. You can also identify the top misconfigured resources and non-compliant AWS accounts, helping prioritize efforts to improve adherence to security frameworks.
+
+This dashboard is ideal for security and compliance teams who need to ensure ongoing alignment with internal policies and external regulatory standards.
+
+
+
+### Regulatory Compliance
+
+The **AWS Security Hub - OCSF - Regulatory Compliance** dashboard presents an in-depth view of your organization's alignment with major cloud security benchmarks and compliance standards, such as AWS Foundational Security Best Practices, CIS Benchmarks, NIST publications, and PCI DSS.
+
+The dashboard shows pass percentages and summary details for each standard, allowing teams to compare compliance levels across frameworks. With this level of granularity, security and governance teams can pinpoint specific areas of misalignment, measure improvement over time, and tailor remediation efforts by standard.
+
+Use this dashboard to assess policy adherence in detail, validate control coverage, and support audit processes with clearly segmented compliance insights.
+
+
+
+### Resources Affected
+
+The **AWS Security Hub - OCSF - Resources Affected** dashboard helps security teams understand which AWS resources are impacted by security findings and where those resources are distributed across cloud accounts and regions.
+
+By organizing data by resource type, severity, and geography, this dashboard helps prioritize remediation based on criticality and business impact. You can identify top affected resource names, evaluate role-based exposure, and explore findings across various infrastructure layers.
+
+With this information, teams can quickly assess the blast radius of an incident, uncover systemic misconfigurations, and take action to protect their most sensitive and critical cloud assets.
+
+
+
+### Action Plan
+
+The **AWS Security Hub - OCSF - Action Plan** dashboard provides a tactical view into common misconfigurations and high-risk behaviors across your AWS environment. It surfaces key remediation opportunities such as exposed credentials, weak password policies, non-compliant security group rules, public access violations, and critical S3 and EC2 misconfigurations.
+
+This dashboard helps operationalize findings by translating alerts into prioritized action items. Security teams can easily pinpoint unused credentials, monitor MFA adoption, and address overly permissive network settings or encryption gaps.
+
+Use this dashboard to drive remediation workflows, reduce the attack surface, and continuously improve your cloud security hygiene through targeted action.
+
+
+
+## Create monitors for AWS Security Hub - OCSF app
+
+import CreateMonitors from '../../reuse/apps/create-monitors.md';
+
+A guide to the Sumo Logic app for Amazon CloudTrail - Cloud Security Monitoring and Analytics
+
diff --git a/docs/integrations/product-list/product-list-a-l.md b/docs/integrations/product-list/product-list-a-l.md
index fc1540f083..42054a8512 100644
--- a/docs/integrations/product-list/product-list-a-l.md
+++ b/docs/integrations/product-list/product-list-a-l.md
@@ -115,7 +115,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
|
| [AWS Network Load Balancer](https://aws.amazon.com/elasticloadbalancing/network-load-balancer/) | App: [AWS Network Load Balancer](/docs/integrations/amazon-aws/network-load-balancer/) |
|
| [AWS OpsWorks](https://aws.amazon.com/opsworks/) | Collector: [Deploy Sumo Logic Collectors on AWS OpsWorks](/docs/send-data/collect-from-other-data-sources/deploy-collectors-aws-opsworks/) |
|
| [AWS Private Certificate Authority](https://aws.amazon.com/private-ca/) | App: [AWS Private Certificate Authority](/docs/integrations/amazon-aws/aws-private-certificate-authority/)
| [AWS Security Hub](https://aws.amazon.com/security-hub/) | Apps:
| [AWS Security Hub](https://aws.amazon.com/security-hub/) | Apps:
| [AWS Simple Notification Service](https://aws.amazon.com/sns/) | Automation integration: [AWS Simple Notification Service](/docs/platform-services/automation-service/app-central/integrations/aws-simple-notification-service/) |
|
| [AWS WAF](https://aws.amazon.com/waf/) | Apps:
| [Axonius](https://www.axonius.com/) | Automation integration: [Axonius](/docs/platform-services/automation-service/app-central/integrations/axonius/) |
diff --git a/sidebars.ts b/sidebars.ts
index 4dcb4b6e08..730a9a2d89 100644
--- a/sidebars.ts
+++ b/sidebars.ts
@@ -2158,6 +2158,7 @@ integrations: [
'integrations/amazon-aws/network-firewall',
'integrations/amazon-aws/network-load-balancer',
'integrations/amazon-aws/security-hub',
+ 'integrations/cloud-security-monitoring-analytics/aws-security-hub-ocsf',
'integrations/amazon-aws/threat-intel',
'integrations/amazon-aws/waf',
'integrations/amazon-aws/cis-aws-foundations-benchmark',
@@ -2409,6 +2410,7 @@ integrations: [
'integrations/cloud-security-monitoring-analytics/amazon-guardduty',
'integrations/cloud-security-monitoring-analytics/amazon-vpc-flow',
'integrations/cloud-security-monitoring-analytics/aws-cloudtrail',
+ 'integrations/cloud-security-monitoring-analytics/aws-security-hub-ocsf',
'integrations/cloud-security-monitoring-analytics/aws-security-hub',
'integrations/cloud-security-monitoring-analytics/aws-waf',
'integrations/cloud-security-monitoring-analytics/linux',