SlideShare a Scribd company logo
1 of 27
Download to read offline
By Crishantha Nanayakkara
AWS Security Hub
Source: AWS Blogs
Agenda
●
What is Security Hub?
●
The Need 
●
The Benefits 
●
How it works
●
Security Hub – Integrations
●
Security Hub – Compliance
●
Pricing
●
Demo
Re­Invent 2018 – Security Hub Launch
Andy Jassy, AWS CEO at Re-Invent 2018, Las Vegas
Reference: https://www.youtube.com/watch?v=a4l1UCo3YHE
The Competition
Azure Security Center Google Cloud Security Command Center
The Need
●
Security Compliance Issues – Which Security 
compliance is most suited?
●
So many security alert formats from different 
security products – Need to spend a lot of money to 
get them to a common format, which can be searched 
and analyzed
●
Too many security alerts from so many products and 
services
●
To have a single integrated view for all security 
alerts
AWS Security Hub provides you with a comprehensive 
view of your security state in your AWS environment and 
helps you check your compliance with the security 
industry standards and best practices.
What is Security Hub?
Security Hub collects security data from across AWS 
accounts, services, and supported third­party partner 
products and helps you analyze your security trends and 
identify the highest priority security issues.
The Benefits
●
Reduces the effort to collect and prioritize security 
findings across accounts from integrated AWS services 
and AWS partner products.
●
Automatically runs continuous, account level 
configuration and compliance checks based on 
industry standards such as CIS benchmarking. 
●
Consolidate your security findings across accounts on  
to a dashboard.
●
Supports integration with CloudWatch events, which 
lets you automate specific findings by defining custom 
actions and send them to a ticketing system.
How it works
Security Hub aggregates, organizes and prioritizes your 
security alerts or findings from multiple AWS services such as 
Amazon GuardDuty, Amazon Inspector and Amazon Macie, 
as well as from AWS partner solutions (30+)
●
AWS GuardDuty: A threat detection service that continuously 
monitors VPC flow logs, CloudTrail logs and DNS logs. It is an 
intelligent threat detection service coupled with Lambda 
functions to take actions.
●
AWS Inspector: A security assessment service, which is used 
to check for application exposures. 
●
AWS Macie: A security service that uses machine learning to 
automatically discover, classify, and protect sensitive data in 
AWS
Security Integrations ­ Services
Security Integrations ­ Partners
Extended the ecosystem to many security partner products
●
AWS Security Hub Findings from AWS Security Services and 
third party products are possessed by Security Hub using a 
standard finding format called AWS Security Finding Format 
(JSON type). 
●
This basically eliminates the need of any time­consuming data 
conversion efforts.
●
Then these findings are correlated via Security Hub by some 
prioritization   
●
Reference: 
https://docs.aws.amazon.com/securityhub/latest/userguide/se
curityhub­findings­format.html
 
AWS Security Finding Format
Security Hub ­ Compliance
Only one Compliance Guideline (43) – CIS Benchmark
How to get there?
CIS Benchmarks
(https://www.cisecurity.org/cis­benchmarks/)
Resource: https://www.cisecurity.org/cis-benchmarks/
CIS AWS Benchmark Report V1.20
The checklist has three 
main parts: 
 IAM, Logging, Monitoring
●
The initial Quick Start Guide was created by 
Accenture in collaboration with AWS.
●
Quick Start sets up the following:
– AWS Config Rules
– CloudWatch Alarms
– CloudWatch Events
– Lambda Functions
– AWS CloudTrail
CIS Quick Start Deployment
CIS Quick Start Deployment 
Architecture
CIS Quick Start Deployment
(The Prerequisites)
Requires AWS CloudTrail and AWS Config 
to be enabled in all AWS Regions
AWS Config
●
AWS Config provides a detailed view of the 
configurations of AWS resources in an AWS account. 
AWS CloudTrail
●
AWS Best Practice: Having the “trail” in a single 
region
CIS Quick Start Deployment
(The Steps)
●
Once login to the AWS console, select the region you 
want to run the compliance.
●
Move to “CloudFormation” on the console.
●
Select the CloudFormation Template from: 
The original version is in: 
https://github.com/aws­quickstart/quickstart­compliance­cis­bench
mark
CIS Quick Start Deployment
(The Steps)
●
If all go well, check Cloudwatch console for the 
events and Logs.
●
You could see a separate set of events, alarms, filters 
and lambda functions are installed on your setup. 
●
These will basically set up the CIS compliance for 
you!!
CIS Quick Start Deployment
(The Steps)
●
If all go well, check Cloudwatch console for the 
events and Logs.
●
You could see a separate set of events, alarms, filters 
and lambda functions are installed on your setup. 
●
These will basically set up the CIS compliance for 
you!!
References
●
CIS Quick Start Compliance Git (Original): 
https://github.com/aws­quickstart/quickstart­compliance­cis­benchmark
●
CIS Benchmark Template Git (Modified): 
https://github.com/cnanayakkara/cis­benchmark­template 
●
AWS Control Tower and Security Hub: 
https://aws.amazon.com/blogs/enterprise­strategy/aws­control­tower­and­a
ws­security­hub­powerful­enterprise­twins/
●
AWS Re­Inforce 2019: 
https://www.youtube.com/watch?v=HsWtPG_rTak&t=1034s 
●
AWS Security Hub – User Guide : 
https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub.pd
f
●
AWS CIS Quick Start Reference Deployment: 
https://aws­quickstart.s3.amazonaws.com/quickstart­compliance­cis­benc
hmark/doc/cis­benchmark­on­the­aws­cloud.pdf
 
Thank YouThank You
Auxenta YouTube Channel: Auxenta YouTube Channel: Auxenta 360Auxenta 360
Auxenta VLOGS: Auxenta VLOGS: http://auxenta.com/vlog.phphttp://auxenta.com/vlog.php

More Related Content

What's hot

Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Amazon Web Services
 

What's hot (20)

Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...
 
AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
 
AWS Security Strategy
AWS Security StrategyAWS Security Strategy
AWS Security Strategy
 
Deploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerDeploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control Tower
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Automating AWS security and compliance
Automating AWS security and compliance Automating AWS security and compliance
Automating AWS security and compliance
 
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech TalksDeep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
 
AWS Control Tower
AWS Control TowerAWS Control Tower
AWS Control Tower
 
Introducing AWS Firewall Manager - AWS Online Tech Talks
Introducing AWS Firewall Manager - AWS Online Tech TalksIntroducing AWS Firewall Manager - AWS Online Tech Talks
Introducing AWS Firewall Manager - AWS Online Tech Talks
 
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
 
AWS Global Infrastructure Foundations
AWS Global Infrastructure Foundations AWS Global Infrastructure Foundations
AWS Global Infrastructure Foundations
 
AWS WAF
AWS WAFAWS WAF
AWS WAF
 
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
Amazon GuardDuty Lab
Amazon GuardDuty LabAmazon GuardDuty Lab
Amazon GuardDuty Lab
 
Getting Started with Amazon Inspector
Getting Started with Amazon InspectorGetting Started with Amazon Inspector
Getting Started with Amazon Inspector
 
Cloud Security (AWS)
Cloud Security (AWS)Cloud Security (AWS)
Cloud Security (AWS)
 
Introduction to AWS IAM
Introduction to AWS IAMIntroduction to AWS IAM
Introduction to AWS IAM
 

Similar to AWS Security Hub

Similar to AWS Security Hub (20)

AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
 
7 Ways to Accelerate Your Enterprise Journey to the Cloud
7 Ways to Accelerate Your Enterprise Journey to the Cloud7 Ways to Accelerate Your Enterprise Journey to the Cloud
7 Ways to Accelerate Your Enterprise Journey to the Cloud
 
Security Hub Forensics & Incident Response
Security Hub Forensics & Incident ResponseSecurity Hub Forensics & Incident Response
Security Hub Forensics & Incident Response
 
APN Overview and Best Practices for Partnering with AWS
APN Overview and Best Practices for Partnering with AWSAPN Overview and Best Practices for Partnering with AWS
APN Overview and Best Practices for Partnering with AWS
 
Improving Security Agility using DevSecOps
Improving Security Agility using DevSecOpsImproving Security Agility using DevSecOps
Improving Security Agility using DevSecOps
 
F4C AWS partner webinars 29july2016
F4C AWS partner webinars 29july2016F4C AWS partner webinars 29july2016
F4C AWS partner webinars 29july2016
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
APN Partner Webinar - AWS Marketplace & Test Drive
APN Partner Webinar - AWS Marketplace & Test DriveAPN Partner Webinar - AWS Marketplace & Test Drive
APN Partner Webinar - AWS Marketplace & Test Drive
 
3 Scaling Lessons Learned the Hard Way with DuploCloud
3 Scaling Lessons Learned the Hard Way with DuploCloud3 Scaling Lessons Learned the Hard Way with DuploCloud
3 Scaling Lessons Learned the Hard Way with DuploCloud
 
AWS & Infrastructure Hardening - Cloud Infrastructure Security
AWS & Infrastructure Hardening - Cloud Infrastructure SecurityAWS & Infrastructure Hardening - Cloud Infrastructure Security
AWS & Infrastructure Hardening - Cloud Infrastructure Security
 
How to Build a Threat Detection Strategy in the AWS Cloud
How to Build a Threat Detection Strategy in the AWS CloudHow to Build a Threat Detection Strategy in the AWS Cloud
How to Build a Threat Detection Strategy in the AWS Cloud
 
2023-09-21_Seminar_Hamar_-_Starte_med_AWS
2023-09-21_Seminar_Hamar_-_Starte_med_AWS2023-09-21_Seminar_Hamar_-_Starte_med_AWS
2023-09-21_Seminar_Hamar_-_Starte_med_AWS
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
securityhub.pdf
securityhub.pdfsecurityhub.pdf
securityhub.pdf
 
Perform a Cloud Readiness Assessment for Your Own Company
Perform a Cloud Readiness Assessment for Your Own CompanyPerform a Cloud Readiness Assessment for Your Own Company
Perform a Cloud Readiness Assessment for Your Own Company
 
AWS Enterprise Summit London | Transforming Your IT with AWS
AWS Enterprise Summit London | Transforming Your IT with AWSAWS Enterprise Summit London | Transforming Your IT with AWS
AWS Enterprise Summit London | Transforming Your IT with AWS
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
 
AWS Meetup - Well-architected Framework (31012017)
AWS Meetup - Well-architected Framework (31012017)AWS Meetup - Well-architected Framework (31012017)
AWS Meetup - Well-architected Framework (31012017)
 

More from Crishantha Nanayakkara

More from Crishantha Nanayakkara (20)

Sri Lanka Government Enterprise Architecture
Sri Lanka Government Enterprise ArchitectureSri Lanka Government Enterprise Architecture
Sri Lanka Government Enterprise Architecture
 
Application Deployement Strategies
Application Deployement StrategiesApplication Deployement Strategies
Application Deployement Strategies
 
Azure for AWS Developers
Azure for AWS DevelopersAzure for AWS Developers
Azure for AWS Developers
 
Enterprise Integration in Cloud Native Microservices Architectures
Enterprise Integration in Cloud Native Microservices ArchitecturesEnterprise Integration in Cloud Native Microservices Architectures
Enterprise Integration in Cloud Native Microservices Architectures
 
AWS Systems Manager
AWS Systems ManagerAWS Systems Manager
AWS Systems Manager
 
AWS Big Data Landscape
AWS Big Data LandscapeAWS Big Data Landscape
AWS Big Data Landscape
 
1BT_Designing_Microservices
1BT_Designing_Microservices1BT_Designing_Microservices
1BT_Designing_Microservices
 
1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access
 
Resiilient Architectures on AWS
Resiilient Architectures on AWSResiilient Architectures on AWS
Resiilient Architectures on AWS
 
Reactive Microservices
Reactive MicroservicesReactive Microservices
Reactive Microservices
 
Expectaions in IT industry
Expectaions in IT industryExpectaions in IT industry
Expectaions in IT industry
 
Towards Cloud Enabled Data Intensive Digital Transformation
Towards Cloud Enabled Data Intensive Digital TransformationTowards Cloud Enabled Data Intensive Digital Transformation
Towards Cloud Enabled Data Intensive Digital Transformation
 
Container Architecture
Container ArchitectureContainer Architecture
Container Architecture
 
Domain Driven Design and Hexagonal Architecture
Domain Driven Design and Hexagonal ArchitectureDomain Driven Design and Hexagonal Architecture
Domain Driven Design and Hexagonal Architecture
 
Microservices
MicroservicesMicroservices
Microservices
 
Enterprise architecture in the current e-Government context in Sri Lanka
Enterprise architecture in the current e-Government context in Sri LankaEnterprise architecture in the current e-Government context in Sri Lanka
Enterprise architecture in the current e-Government context in Sri Lanka
 
Modern Trends in IT
Modern Trends in ITModern Trends in IT
Modern Trends in IT
 
ICTA Meetup 12 - Message Brokers
ICTA Meetup 12 - Message BrokersICTA Meetup 12 - Message Brokers
ICTA Meetup 12 - Message Brokers
 
ICTA Meetup 11 - Big Data
ICTA Meetup 11 - Big DataICTA Meetup 11 - Big Data
ICTA Meetup 11 - Big Data
 
Lanka Gate Core Components - Government CIO Workshop Dec 2013
Lanka Gate Core Components - Government CIO Workshop Dec 2013Lanka Gate Core Components - Government CIO Workshop Dec 2013
Lanka Gate Core Components - Government CIO Workshop Dec 2013
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Recently uploaded (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 

AWS Security Hub