Skip to content
Open
Show file tree
Hide file tree
Changes from 5 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 5 additions & 2 deletions redirects.yml
Original file line number Diff line number Diff line change
Expand Up @@ -545,7 +545,7 @@ redirects:
'solutions/security/cloud/integration-tenablevm.md': 'solutions/security/integrations/tenablevm.md'
'solutions/security/cloud/integration-rapid7.md': 'solutions/security/integrations/rapid7.md'
'solutions/security/cloud/integration-qualys.md': 'solutions/security/integrations/qualys.md'
'solutions/security/cloud/ingest-aws-security-hub-data.md': 'solutions/security/integrations/aws-security-hub.md'
'solutions/security/cloud/ingest-aws-security-hub-data.md': 'solutions/security/integrations/aws-security-hub-cspm.md'
'solutions/security/cloud/aws-config-integration.md': 'solutions/security/integrations/aws-config.md'

# Deduplicate canvas function reference
Expand Down Expand Up @@ -616,7 +616,7 @@ redirects:
# Related to https://github.com/elastic/docs-content/issues/2662
'solutions/security/cloud/integrations/aws-config.md': 'solutions/security/integrations/aws-config.md'
'solutions/security/cloud/integrations/aws-inspector.md': 'solutions/security/integrations/aws-inspector.md'
'solutions/security/cloud/integrations/aws-security-hub.md': 'solutions/security/integrations/aws-security-hub.md'
'solutions/security/cloud/integrations/aws-security-hub.md': 'solutions/security/integrations/aws-security-hub-cspm.md'
'solutions/security/cloud/integrations/cncf-falco.md': 'solutions/security/integrations/cncf-falco.md'
'solutions/security/cloud/integrations/google-security-command-center.md': 'solutions/security/integrations/google-security-command-center.md'
'solutions/security/cloud/integrations/ingest-third-party-cloud-security-data.md': 'solutions/security/integrations/ingest-third-party-security-data.md'
Expand All @@ -631,3 +631,6 @@ redirects:
# Move CCS feature docs to explore-analyze
'solutions/search/cross-cluster-search.md': 'explore-analyze/cross-cluster-search.md'
'solutions/search/cross-cluster-search/using-resolve-cluster-endpoint-before-cross-cluster-search.md': 'explore-analyze/cross-cluster-search/using-resolve-cluster-endpoint-before-cross-cluster-search.md'
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This line is adding another redirect for a cross-cluster-search doc...Is this intentional?


# Rename AWS Security Hub integration's name to AWS Security Hub CSPM
'solutions/security/integrations/aws-security-hub.md': 'solutions/security/integrations/aws-security-hub-cspm.md'
25 changes: 25 additions & 0 deletions solutions/security/integrations/aws-sec-hub.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
---
applies_to:
stack: preview 9.3
serverless:
security: preview
products:
- id: security
- id: cloud-serverless
---

# AWS Security Hub

Check notice on line 11 in solutions/security/integrations/aws-sec-hub.md

View workflow job for this annotation

GitHub Actions / preview / vale

Elastic.Capitalization: 'AWS Security Hub' should use sentence-style capitalization.
This integration uses the AWS Security Hub API to ingest vulnerability findings which appear in Elastic’s native vulnerability workflows. This page explains how to make data from the AWS Security Hub integration appear in the following places within {{elastic-sec}}:

- **Findings page**: Data appears on the [Vulnerabilities](/solutions/security/cloud/findings-page.md) tab.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The linked page is about the Misconfigurations tab.

- **Alert and Entity details flyouts**: Applicable data appears in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section).

In order for AWS Security Hub data to appear in these workflows:

* Follow the steps to [set up the AWS Security Hub integration](https://docs.elastic.co/en/integrations/aws/securityhub link invalid).
* Ensure you have `read` privileges for the `security_solution-*.vulnerabilities_latest` index.
DRAFT? * While configuring the AWS Security Hub integration, turn on **Collect AWS Security Hub Findings from AWS**. We recommend you also set the **Initial Interval** value to `2160h` (equivalent to 90 days) to ingest existing logs.

::::{note}
You can ingest data from the AWS Security Hub integration for other purposes without following these steps.
::::
33 changes: 33 additions & 0 deletions solutions/security/integrations/aws-security-hub-cspm.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
---
mapped_pages:
- https://www.elastic.co/guide/en/security/current/ingest-aws-securityhub-data.html
- https://www.elastic.co/guide/en/serverless/current/ingest-aws-securityhub-data.html
applies_to:
stack: all
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think we use all anymore.

serverless:
security: all
products:
- id: security
- id: cloud-serverless
---

# AWS Security Hub CSPM

Check notice on line 14 in solutions/security/integrations/aws-security-hub-cspm.md

View workflow job for this annotation

GitHub Actions / preview / vale

Elastic.Acronyms: 'CSPM' has no definition.

Check notice on line 14 in solutions/security/integrations/aws-security-hub-cspm.md

View workflow job for this annotation

GitHub Actions / preview / vale

Elastic.Capitalization: 'AWS Security Hub CSPM' should use sentence-style capitalization.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Because the names of the two integrations are so similar, it might be helpful to briefly explain the difference between them. Is the difference that Security Hub ingests vulnerability findings and Security Hub CSPM ingests misconfiguration findings? If so, we could add a sentence here similar to this one ("This integration uses the AWS Security Hub API to ingest misconfiguration findings...")

This page explains how to make data from the AWS Security Hub CSPM integration appear in the following places within {{elastic-sec}}:

Check notice on line 15 in solutions/security/integrations/aws-security-hub-cspm.md

View workflow job for this annotation

GitHub Actions / preview / vale

Elastic.Acronyms: 'CSPM' has no definition.

- **Findings page**: Data appears on the [Misconfigurations](/solutions/security/cloud/findings-page.md) tab.
- **Alert and Entity details flyouts**: Applicable data appears in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section).

In order for AWS Security Hub CSPM data to appear in these workflows:

Check notice on line 20 in solutions/security/integrations/aws-security-hub-cspm.md

View workflow job for this annotation

GitHub Actions / preview / vale

Elastic.Acronyms: 'CSPM' has no definition.

* Follow the steps to [set up the AWS Security Hub CSPM integration](https://docs.elastic.co/en/integrations/aws/securityhub).

Check notice on line 22 in solutions/security/integrations/aws-security-hub-cspm.md

View workflow job for this annotation

GitHub Actions / preview / vale

Elastic.Acronyms: 'CSPM' has no definition.
* Make sure the integration version is at least 2.31.1.
* Ensure you have `read` privileges for the `security_solution-*.misconfiguration_latest` index.
* While configuring the AWS Security Hub CSPM integration, turn on **Collect AWS Security Hub CSPM Findings from AWS**. We recommend you also set the **Initial Interval** value to `2160h` (equivalent to 90 days) to ingest existing logs.

Check notice on line 25 in solutions/security/integrations/aws-security-hub-cspm.md

View workflow job for this annotation

GitHub Actions / preview / vale

Elastic.Acronyms: 'CSPM' has no definition.

:::{image} /solutions/images/security-aws-config-finding-logs.png
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This screenshot still shows the previous integration name.

:alt: AWS Security Hub CSPM integration settings showing the findings toggle

Check notice on line 28 in solutions/security/integrations/aws-security-hub-cspm.md

View workflow job for this annotation

GitHub Actions / preview / vale

Elastic.Acronyms: 'CSPM' has no definition.
:::

::::{note}
You can ingest data from the AWS Security Hub CSPM integration for other purposes without following these steps.

Check notice on line 32 in solutions/security/integrations/aws-security-hub-cspm.md

View workflow job for this annotation

GitHub Actions / preview / vale

Elastic.Acronyms: 'CSPM' has no definition.
::::
33 changes: 0 additions & 33 deletions solutions/security/integrations/aws-security-hub.md

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,8 @@

* [AWS Config](/solutions/security/integrations/aws-config.md)
* [AWS Inspector](/solutions/security/integrations/aws-inspector.md)
* [AWS Security Hub](/solutions/security/integrations/aws-security-hub.md)
* [AWS Security Hub](/solutions/security/integrations/aws-sec-hub.md)
* [AWS Security Hub CSPM](/solutions/security/integrations/aws-security-hub-cspm.md)

Check notice on line 47 in solutions/security/integrations/ingest-third-party-security-data.md

View workflow job for this annotation

GitHub Actions / preview / vale

Elastic.Acronyms: 'CSPM' has no definition.
* [Google Security Command Center](/solutions/security/integrations/google-security-command-center.md)
* [Microsoft Defender for Cloud](/solutions/security/integrations/microsoft-defender-for-cloud.md)
* [Microsoft Defender for Endpoint](/solutions/security/integrations/microsoft-defender-for-endpoint.md)
Expand Down
3 changes: 2 additions & 1 deletion solutions/toc.yml
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
project: "Solutions and use cases"
toc:
- file: index.md
Expand Down Expand Up @@ -687,7 +687,8 @@
- file: security/integrations/ingest-third-party-security-data.md
children:
- file: security/integrations/cncf-falco.md
- file: security/integrations/aws-security-hub.md
- file: security/integrations/aws-sec-hub.md
- file: security/integrations/aws-security-hub-cspm.md
- file: security/integrations/wiz.md
- file: security/integrations/qualys.md
- file: security/integrations/tenablevm.md
Expand Down