Security Hub - Overview

Security Standards

  1. Navigate to AWS Security Hub summary page.

VPC VPC VPC
2. From the Summary page, you can see what standards have been enabled in your account, and you can see the number of passed and failed controls per standard. The percentage is the percent of controls in a “passed” compliance status compared to the number of controls that have a “passed” or “failed” compliance status.

VPC

  1. Click on Security standards from the navigation on the left. VPC

  2. Standards were enabled using CloudFormation when the workshop was provisioned. VPC

  3. Let’s dive into one of the standards. Click View Results for NIST Special Publication 800-53 Revision 5. VPC

Controls

  1. From the top of the page, you can select tabs to show only “Passed”, “Failed”, “Disabled”, etc. controls. You can also filter to a control using the search bar that says “Filter all enabled controls”. Click the search bar and filter on ID. Specify ID = EC2.13. VPC

  2. Click on the Title: Security groups should not allow ingress from 0.0.0.0/0 to port 22. This presents a view of all resources evaluated for this particular control and the current status of each resource as it relates to the control. Notice there are some resources with a FAILED status and some with a PASSED status. VPC

  3. AWS Security Hub Security Standards provide remediation instructions for each check. At the top of the page click the Remediation instructions link to open guidance in a new tab. VPC

Investigating a misconfigured resource

  1. Return to the Security Hub control you were looking at. For one of the FAILED resources open Config rule in the Investigate column. This will display links that will take you to AWS Config to view the configuration timeline for this resource or the overall config rule that performed the evaluation on this resource. VPC

  2. Click Configuration timeline. This opens AWS Config, and shows the resource configuration timeline for this security group. From here, you can investigate the point in time when the resource became non-compliant by reviewing the timestamped events. If you want, take a minute to expand a couple of the events. VPC

  3. Expand a CloudTrail Event listed. VPC

  4. Then click CloudTrail under View event. This opens up that event, logged in CloudTrail. AWS CloudTrail monitors and records account activity across your AWS infrastructure, giving you control over storage, analysis, and remediation actions. VPC

Consolidated controls

  1. Return to Security Hub and open General settings page from the navigation panel. https://console.aws.amazon.com/securityhub/home?#/settings/general VPC

  2. At the top of the page, you should see that both “Auto-enable new controls in enabled standards” and “Consolidated control findings” is enabled.

  3. Click Controls from the navigation panel. This page shows a similar view to what you reviewed at the standard level, but here you see the full list of consolidated controls. This makes it easier to see how many individual controls in your account are passing, failing, or in some other state. Additionally, with consolidated findings enabled, controls included in multiple enabled standards no longer generate a finding per standard (duplicates). This helps manage the number of findings in your environment and removes potential confusion around duplicate findings.

VPC

Insights

  1. In the navigation on the left, click Insights. VPC
  2. In the search bar, input “severity” and select the insight named 24. Severity by counts of findings. VPC
  3. Security Hub offers several built-in managed insights. You cannot modify or delete managed insights. 24. Severity by counts of findings is one of the managed insights. Take a minute to review the number of findings in the environment. Select a Severity Label (e.g. Critical) to see the underlying finding(s). VPC