Skip to main content
Latest Documentation
This is the latest documentation for the Cloud Posse Reference Architecture. To determine which version you're currently using, please see Version Identification.

AWS Security Hub

AWS Security Hub provides a centralized dashboard for aggregating, organizing, and prioritizing security findings from AWS services and third-party tools across your organization.

Overview

Security Hub provides:

  • Centralized Security Management: Unified dashboard for security findings from multiple accounts and regions
  • Product Subscriptions: Integration with GuardDuty, Inspector, Macie, Config, and Access Analyzer
  • Compliance Standards: CIS AWS Foundations, PCI DSS, AWS Foundational Security Best Practices
  • Finding Aggregation: Cross-region aggregation for centralized visibility
  • Automated Remediation: EventBridge integration for automated response

Key Features

FeatureDescription
Product SubscriptionsAutomatically receive findings from AWS security services
Security StandardsCompliance checks against industry frameworks
Custom InsightsCreate custom views of security data
Finding AggregationAggregate findings from all regions into one
SNS NotificationsAlert on new findings via SNS

Product Subscriptions

Security Hub integrates with these AWS services:

ProductDefaultDescription
GuardDutytrueThreat detection findings
InspectortrueVulnerability scanning findings
MacietrueSensitive data discovery findings
ConfigtrueConfiguration compliance findings
Access AnalyzertrueExternal access findings
Firewall ManagerfalseFirewall policy compliance

Architecture

Deployment

Security Hub uses a 3-step delegated administrator deployment model.

Step 1: Deploy to Delegated Administrator Account

# core-ue1-security
components:
terraform:
aws-security-hub/delegated-administrator:
metadata:
component: security-hub
vars:
enabled: true
delegated_administrator_account_name: core-security
environment: ue1
region: us-east-1
# Product subscriptions for AWS security service integrations
product_subscriptions:
guardduty: true
inspector: true
macie: true
config: true
access_analyzer: true
firewall_manager: false
atmos terraform apply aws-security-hub/delegated-administrator -s core-ue1-security

Step 2: Deploy to Organization Management Account

Root Access Required:

This step requires root account access (such as with the managers profile).

# core-ue1-root
components:
terraform:
aws-security-hub/root:
metadata:
component: security-hub
backend:
s3:
role_arn: null
vars:
enabled: true
delegated_administrator_account_name: core-security
environment: ue1
region: us-east-1
privileged: true
atmos terraform apply aws-security-hub/root -s core-ue1-root

Step 3: Deploy Organization Settings

# core-ue1-security
components:
terraform:
aws-security-hub/org-settings:
metadata:
component: security-hub
vars:
enabled: true
delegated_administrator_account_name: core-security
environment: ue1
region: us-east-1
admin_delegated: true
atmos terraform apply aws-security-hub/org-settings -s core-ue1-security

Compliance Standards

Enable security standards for compliance monitoring:

components:
terraform:
aws-security-hub/delegated-administrator:
vars:
enabled_standards:
- standards/aws-foundational-security-best-practices/v/1.0.0
- standards/cis-aws-foundations-benchmark/v/1.4.0
# Optional additional standards:
# - standards/pci-dss/v/3.2.1

Finding Aggregation

Enable cross-region finding aggregation:

components:
terraform:
aws-security-hub/delegated-administrator:
vars:
finding_aggregator_enabled: true
finding_aggregator_linking_mode: ALL_REGIONS
# Or aggregate from specific regions:
# finding_aggregator_linking_mode: SPECIFIED_REGIONS
# finding_aggregator_regions:
# - us-east-1
# - us-west-2

Key Variables

VariableDescriptionDefault
admin_delegatedSet to true after delegationfalse
auto_enable_organization_membersAuto-enroll new memberstrue
product_subscriptionsMap of product subscription settingsSee above
enabled_standardsList of compliance standards to enable[]
finding_aggregator_enabledEnable cross-region aggregationfalse
create_sns_topicCreate SNS topic for notificationsfalse

Verification

After deployment, verify product subscriptions:

# Via Terraform output
atmos terraform output aws-security-hub/delegated-administrator -s core-ue1-security

# Via AWS CLI
aws securityhub list-enabled-products-for-import --region us-east-1

See Also

References