[ad_1]
On this weblog publish, we present you methods to allow and configure AWS Safety Hub utilizing the brand new Safety Hub CloudFormation sources. Safety Hub has expanded help for AWS CloudFormation by launching the up to date Safety Hub Hub useful resource and a brand new Requirements useful resource for CloudFormation. The Hub useful resource can be utilized to allow Safety Hub default requirements and handle the consolidated management findings characteristic. The Requirements useful resource can be utilized to handle safety requirements. This deployment may be carried out at scale throughout a number of AWS accounts or organizational items (OU) in a corporation.
Safety Hub offers you with a complete view of your safety posture in AWS by checking your surroundings in opposition to safety trade requirements and greatest practices. Safety Hub offers a single place that aggregates, organizes, and prioritizes safety findings from a number of AWS providers and companion options that you should utilize to investigate your safety tendencies and establish the very best precedence safety points.
Answer overview
We offer pattern CloudFormation templates specializing in particular Safety Hub use circumstances. You should utilize these templates should you’re getting began with Safety Hub or should you’re an present Safety Hub buyer and need to use CloudFormation.
You should utilize CloudFormation Stacks or StackSets to deploy the templates on this publish. CloudFormation StackSets extends the performance of stacks by enabling you to create, replace, or delete stacks throughout a number of accounts and AWS Areas with a single operation. Utilizing an administrator account, you outline and handle a CloudFormation template and use it as the idea for provisioning stacks into chosen goal accounts throughout specified Areas. For extra info, see working with AWS CloudFormation StackSets.
Within the following sections we offer some pattern use circumstances. Use the steerage offered in every part to know what accounts and Areas the stack units ought to be deployed in.
Notice: With CloudFormation StackSets, the template isn’t deployed within the StackSet administrator account by default. The CloudFormation stack have to be deployed individually within the StackSet administrator account.
Conditions
Safety Hub makes use of service-linked AWS Config guidelines to carry out most of its safety checks for controls. We suggest that you just allow AWS Config throughout your accounts and Areas. AWS Config may be managed utilizing the CloudFormation Config Recorder and Supply Channel sources.
Expertise with CloudFormation StackSets.
Should you’re already a Safety Hub consumer and need to begin utilizing CloudFormation to handle requirements and controls, then it’s essential to import the Requirements useful resource into CloudFormation earlier than deploying the instance templates on this publish. Seek advice from the Configuration for present Safety Hub deployments part that follows.
You have to know the StandardsARN of the Safety Hub requirements you need to allow utilizing CloudFormation. You will discover these by utilizing the next AWS Command Line Interface (AWS CLI) command:
Alternately, the StandardsARN on the time of penning this publish are:
Safety Commonplace
Requirements subscription ARN
CIS 1.2
arn:${AWS::Partition}:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0
CIS 1.4
arn:${AWS::Partition}:securityhub:${AWS::Area}::requirements/cis-aws-foundations-benchmark/v/1.4.0
AFSBP
arn:${AWS::Partition}:securityhub:${AWS::Area}::requirements/aws-foundational-security-best-practices/v/1.0.0
NIST
arn:${AWS::Partition}:securityhub:${AWS::Area}::requirements/nist-800-53/v/5.0.0
PCI
arn:${AWS::Partition}:securityhub:${AWS::Area}::requirements/pci-dss/v/3.2.1
Should you plan to disable controls utilizing CloudFormation, then it’s essential to know the ControlsARN of the controls you need to disable. This may be discovered utilizing the next AWS CLI instructions:
Use case 1: Enabling Safety Hub throughout accounts in a corporation with requirements and findings consolidation enabled
Safety Hub offers prospects with safety requirements that embody a set of necessities to find out compliance with regulatory frameworks, trade greatest practices, and firm insurance policies. New prospects getting began with Safety Hub may need to allow the AWS Foundational Safety Finest Practices (FSBP) customary throughout their AWS accounts in a corporation. You possibly can optionally allow extra Safety Hub requirements as wanted in your surroundings. For instance, you may need a gaggle of AWS accounts which can be topic to PCI compliance laws and so it is suggested that you just allow the PCI customary throughout these accounts.
As well as, most Safety Hub controls are relevant to a number of safety requirements, so we suggest enabling findings consolidation. With findings consolidation, Safety Hub generates a single discovering for a management test even when the test applies to a number of enabled requirements. The ControlFindingGenerator property specifies whether or not an account has consolidated management findings turned on or off. If the worth for this subject is about to SECURITY_CONTROL, as within the template that follows, Safety Hub generates a single discovering for a management test even when the test applies to a number of enabled requirements.
For an inventory of obtainable requirements and the controls that apply to them, see Requirements reference.
You should utilize the template that follows to allow Safety Hub with the AWS FSBP customary and findings consolidation enabled:
To allow extra safety requirements, you should utilize the pattern template beneath. You possibly can edit this template to incorporate solely the requirements which can be related to your surroundings.
Notice: It’s really helpful to set the EnableDefaultStandards property to false, as offered within the pattern above, and handle the default requirements as a part of the Requirements useful resource to handle every useful resource independently.
Deployment steps:
Log in to the AWS Administration Console utilizing your group administration account or StackSet administrator account and choose the suitable Area.
Navigate to the AWS CloudFormation StackSets console within the Area getting used, and create a brand new StackSet utilizing one of many previous pattern templates. You possibly can copy and paste the template right into a notepad and put it aside with a .yaml extension.
Enter the Stack identify and Stack Description, after which select Subsequent.
Beneath deployment targets, you may select to deploy the template to the accounts in your group or to particular OUs or accounts. You may also specify the Areas to deploy the template.
Select Subsequent after which select Submit.
On the Stack Cases display, validate the StackSet deployment and look forward to the stack occasion standing to vary from OUTDATED to CURRENT.
For extra info, see the documentation on making a stack set.
Use case 2: Allow NIST 800-53, CIS1.2 and AWS FSBP throughout all accounts or Areas and disable particular controls
Safety Hub not too long ago launched help for the NIST SP 800-53 r5 customary, which incorporates over 220 automated controls that conduct continuous checks in opposition to the choose NIST SP 800-53 r5 necessities throughout numerous AWS providers.
By default, when a safety customary is enabled, all of the controls in the usual are additionally enabled. Disabling controls that aren’t related to your surroundings makes it less complicated to establish the findings which can be necessary and that you need to act on. You may also disable controls which can be related to providers you aren’t utilizing or if you have already got compensating controls in place. Evaluate Safety Hub controls that you just may need to disable and Disabling Safety Hub controls in a multi-account surroundings for details about the controls you may need to disable. The latter publish walks by means of the method of disabling controls utilizing an AWS CLI script should you don’t need to use CloudFormation.
On this instance, we allow NIST 800-53, CIS1.2 and AWS FSBP requirements and disable [CloudTrail.2] Management ID (CloudTrail ought to have encryption at-rest enabled) as really helpful in controls you may need to disable. Seek advice from prerequisite quantity 5 above to establish the controls ARN for this Management ID.
Notice: The mapping of controls throughout completely different requirements may need completely different management IDs. On this template, CloudTrail.2 in AWS FSBP is mapped to manage ID 2.7 in CIS1.2 customary. The total listing of controls and its mapping throughout requirements may be discovered within the Safety Hub controls reference.
You must use this template in all accounts and Areas apart from the centralized logging account or log-archive account and Area the place the centralized logging takes place. When enabling a number of requirements in a single CloudFormation template, use the DependsOn attribute for every useful resource to depend upon the earlier Requirements useful resource to accommodate for charge restrict with the BatchEnableStandards API.
Use case 3: Enabling a management that was beforehand disabled throughout all accounts and Areas or particular OUs
For enabling a management that was beforehand disabled, merely take away it from the DisableStandardControl property. For instance, you may modify the template offered in Use case 2 to make use of it in a central logging account by eradicating the DisabledStandardsControls property underneath all requirements. You possibly can then use the StackSet deployment targets to offer the IDs of the OUs you need the template to be deployed in as proven in Determine 1 in Use case 1.
Configuration for present Safety Hub deployments
Should you’re an present Safety Hub buyer and need to handle Safety Hub utilizing CloudFormation, you’ve gotten two choices. One possibility is to disable present sources after which allow them utilizing CloudFormation. The opposite possibility is to import the sources in CloudFormation Stacks.
Disabling present sources and allow utilizing CloudFormation
On this possibility you first disable all Safety Hub requirements throughout all accounts and Areas after which re-enable the requirements utilizing CloudFormation StackSets. With this methodology, you don’t need to undergo the method of importing sources into stacks and StackSets. You should utilize the Safety Hub multi-account scripts to disable requirements as reviewed in part 2b of this repo. Evaluate Enabling and disabling safety requirements issues earlier than disabling requirements. You possibly can then use the CloudFormation Requirements useful resource to re-enable and handle desired requirements. You should utilize templates offered in use circumstances 1 and a pair of above to handle the requirements and controls. Nonetheless, between the time that the requirements are disabled and re-enabled utilizing CloudFormation, checks for controls is not going to be carried out by Safety Hub. New findings shall be generated when the requirements are re-enabled and downstream automations shall be re-launched. You’ll lose any notes provided when controls had been initially disabled.
You may also disable Safety Hub totally in all accounts and Areas utilizing the method in part 2b of this repo, after which re-enable Safety Hub utilizing CloudFormation sources to be managed utilizing CloudFormation. Nonetheless, along with implications of disabling requirements as described within the earlier paragraph, additionally, you will must recreate insights, automation guidelines, and integrations with third-party instruments that you just may need beforehand created or enabled. Earlier than disabling Safety Hub, evaluation Disabling Safety Hub for issues.
Import Sources
Should you created an AWS useful resource exterior of CloudFormation administration, you may deliver that present useful resource into CloudFormation administration utilizing useful resource import. You possibly can handle your sources utilizing CloudFormation with out having to delete and re-create them as a part of a stack. You possibly can then import these sacks right into a StackSet. For an inventory of AWS sources that help import operations, see Sources that help import operations.
As of this writing, CloudFormation solely helps the import of the Safety Hub requirements useful resource in a stack. Which means that you continue to should handle the Safety Hub configuration — akin to enabling consolidated findings — exterior of CloudFormation. Should you enabled Safety Hub by means of the console or the AWS CLI, you may nonetheless handle requirements utilizing CloudFormation with out importing the Safety Hub useful resource.
Safety Hub enabled requirements and disabled controls have to be uniform throughout all accounts and Areas the place you intend to make use of the stack within the StackSet. Think about using separate StackSets If the requirements and controls should not uniform.
You possibly can create a brand new stack to import the prevailing Safety Hub requirements. Import Current Sources right into a CloudFormation Stack walks by means of a pattern course of that you should utilize for Safety Hub.
The next is an instance of importing requirements which can be already enabled. The property DeletionPolicy is obligatory for the import course of to work.
You have to repeat the import course of for every account and Area the place you need to handle Safety Hub requirements utilizing CloudFormation. After you’ve gotten all of the stacks imported, it’s essential to import the stacks into StackSets to handle the stacks from a single account.
Conclusion
On this weblog publish, you realized concerning the new Safety Hub Hub and Requirements sources for CloudFormation. You should utilize these sources to handle Safety Hub deployments, requirements, and controls throughout your AWS accounts and Areas. We offered some samples for CloudFormation templates to allow Safety Hub findings consolidation, requirements, and disable some controls. You possibly can modify these samples to suit your wants. Go to the hyperlinks beneath for extra info on Safety Hub and the expanded integration with CloudFormation.
For extra info, see Getting began with AWS Safety Hub and AWS Safety Hub useful resource kind reference.
If in case you have suggestions about this publish, submit feedback within the Feedback part beneath. If in case you have questions on this publish, contact AWS Assist.
Need extra AWS Safety information? Comply with us on Twitter.
[ad_2]
Source link