4.16 Ensure AWS Security Hub is enabled

Information

Security Hub collects security data from across AWS accounts, services, and supported third-party partner products and helps you analyze your security trends and identify the highest priority security issues. When you enable Security Hub, it begins to consume, aggregate, organize, and prioritize findings from AWS services that you have enabled, such as Amazon GuardDuty, Amazon Inspector, and Amazon Macie. You can also enable integrations with AWS partner security products.

Rationale:

AWS Security Hub provides you with a comprehensive view of your security state in AWS and helps you check your environment against security industry standards and best practices - enabling you to quickly assess the security posture across your AWS accounts.

Impact:

It is recommended AWS Security Hub be enabled in all regions. AWS Security Hub requires AWS Config to be enabled.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To grant the permissions required to enable Security Hub, attach the Security Hub managed policy AWSSecurityHubFullAccess to an IAM user, group, or role.
Enabling Security Hub
From Console:

Use the credentials of the IAM identity to sign in to the Security Hub console.

When you open the Security Hub console for the first time, choose Enable AWS Security Hub.

On the welcome page, Security standards list the security standards that Security Hub supports.

Choose Enable Security Hub.

From Command Line:

Run the enable-security-hub command. To enable the default standards, include --enable-default-standards.

aws securityhub enable-security-hub --enable-default-standards

To enable the security hub without the default standards, include --no-enable-default-standards.

aws securityhub enable-security-hub --no-enable-default-standards

See Also

https://workbench.cisecurity.org/benchmarks/14207

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-3, CSCv7|11.3

Plugin: amazon_aws

Control ID: 93f0681bdced43249ebf8d91825ca33f4168e33d97f8f5e0c48a795911ca032a