-
Notifications
You must be signed in to change notification settings - Fork 201
AWS Security Hub updates #4531
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
AWS Security Hub updates #4531
Changes from 5 commits
a610509
655d90a
69eb2ec
9ea7a55
af88156
d7d8fa6
0a9d147
b0e274a
dbde06e
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,25 @@ | ||
| --- | ||
| applies_to: | ||
| stack: preview 9.3 | ||
| serverless: | ||
| security: preview | ||
| products: | ||
| - id: security | ||
| - id: cloud-serverless | ||
| --- | ||
|
|
||
| # AWS Security Hub | ||
| This integration uses the AWS Security Hub API to ingest vulnerability findings which appear in Elastic’s native vulnerability workflows. This page explains how to make data from the AWS Security Hub integration appear in the following places within {{elastic-sec}}: | ||
|
|
||
| - **Findings page**: Data appears on the [Vulnerabilities](/solutions/security/cloud/findings-page.md) tab. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The linked page is about the Misconfigurations tab. |
||
| - **Alert and Entity details flyouts**: Applicable data appears in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section). | ||
|
|
||
| In order for AWS Security Hub data to appear in these workflows: | ||
|
|
||
| * Follow the steps to [set up the AWS Security Hub integration](https://docs.elastic.co/en/integrations/aws/securityhub link invalid). | ||
| * Ensure you have `read` privileges for the `security_solution-*.vulnerabilities_latest` index. | ||
| DRAFT? * While configuring the AWS Security Hub integration, turn on **Collect AWS Security Hub Findings from AWS**. We recommend you also set the **Initial Interval** value to `2160h` (equivalent to 90 days) to ingest existing logs. | ||
|
|
||
| ::::{note} | ||
| You can ingest data from the AWS Security Hub integration for other purposes without following these steps. | ||
| :::: | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,33 @@ | ||
| --- | ||
| mapped_pages: | ||
| - https://www.elastic.co/guide/en/security/current/ingest-aws-securityhub-data.html | ||
| - https://www.elastic.co/guide/en/serverless/current/ingest-aws-securityhub-data.html | ||
| applies_to: | ||
| stack: all | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I don't think we use |
||
| serverless: | ||
| security: all | ||
| products: | ||
| - id: security | ||
| - id: cloud-serverless | ||
| --- | ||
|
|
||
| # AWS Security Hub CSPM | ||
|
Check notice on line 14 in solutions/security/integrations/aws-security-hub-cspm.md
|
||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Because the names of the two integrations are so similar, it might be helpful to briefly explain the difference between them. Is the difference that Security Hub ingests vulnerability findings and Security Hub CSPM ingests misconfiguration findings? If so, we could add a sentence here similar to this one ("This integration uses the AWS Security Hub API to ingest misconfiguration findings...") |
||
| This page explains how to make data from the AWS Security Hub CSPM integration appear in the following places within {{elastic-sec}}: | ||
|
|
||
| - **Findings page**: Data appears on the [Misconfigurations](/solutions/security/cloud/findings-page.md) tab. | ||
| - **Alert and Entity details flyouts**: Applicable data appears in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section). | ||
|
|
||
| In order for AWS Security Hub CSPM data to appear in these workflows: | ||
|
|
||
| * Follow the steps to [set up the AWS Security Hub CSPM integration](https://docs.elastic.co/en/integrations/aws/securityhub). | ||
| * Make sure the integration version is at least 2.31.1. | ||
| * Ensure you have `read` privileges for the `security_solution-*.misconfiguration_latest` index. | ||
| * While configuring the AWS Security Hub CSPM integration, turn on **Collect AWS Security Hub CSPM Findings from AWS**. We recommend you also set the **Initial Interval** value to `2160h` (equivalent to 90 days) to ingest existing logs. | ||
|
|
||
| :::{image} /solutions/images/security-aws-config-finding-logs.png | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This screenshot still shows the previous integration name. |
||
| :alt: AWS Security Hub CSPM integration settings showing the findings toggle | ||
| ::: | ||
|
|
||
| ::::{note} | ||
| You can ingest data from the AWS Security Hub CSPM integration for other purposes without following these steps. | ||
| :::: | ||
This file was deleted.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This line is adding another redirect for a cross-cluster-search doc...Is this intentional?