AWS Security Hub

The AWS Security Hub Integration is an offering provided through the Archer Exchange to enhance your existing Archer implementation.

Archer Exchange: With the Archer Exchange, the Archer team has created a broad selection of supplemental, value-added offerings to help you get your unique risk management program on the right path, right from the start. You can leverage the Archer Exchange offerings to expand the use of Archer solutions into new business processes and address specific industry, geographic, regulatory, or technical requirements.

Release history

Release Version

Published Date

Notes

Archer 6.7

July 2024

Resigned JavaScript file

Archer 6.7

January 2022

Resigned JavaScript file

Archer 6.7

May 2020

Initial Release

Overview

AWS Security Hub creates a centralized view of your security and compliance posture across multiple AWS services, such as AWS Identity and Access Management Access Analyzer, Amazon GuardDuty, AWS Firewall Manager, AWS partner offerings, and many more. Native to Security Hub, Amazon CloudWatch Event rules allow you to prioritize and group findings into tickets or automated remediation systems. Findings in Security Hub are presented using the standardized AWS Security Finding Format across all sources. This removes the need for burdensome data conversion.

About GuardDuty

GuardDuty is a managed threat detection service that uses machine learning to safeguard critical AWS accounts and services from malicious activity and other security threats. GuardDuty monitors activities and logs issues within the AWS environment, provides recommended remediation actions, and assigns numeric severity values to these issues. Issues are then categorized into three severity levels based on the criticality and type of threat detected. It provides continuous monitoring and alerts for threats, such as crypto-currency mining, compromised credentials, API calls from malicious IPs, and more. GuardDuty offers seamless integration with AWS CloudWatch Events and Lambda to provide automated remediation actions.  

Key features and benefits

AWS Security Hub enables you to:

  • Reduce effort to capture and prioritize security findings across AWS services and partner offerings.

  • Continuously generate findings from AWS accounts and services into a centralized location.

  • Correlate and prioritize findings across AWS and partner offerings in a standardized format.

  • Customize CloudWatch Events creation to filter and route key data to several target streams.

  • Identify accounts or resources that require attention through frequent configuration and compliance checks.

  • Automate a threat detection service that continuously monitors your AWS accounts for potential malicious activity and vulnerabilities.

  • Track trends, potential issues, and take necessary steps to fix critical issues.

Requirements

Component

Requirement

Archer Solution

IT Security Risk Management

Archer Use Case

Issues Management, IT Controls Assurance (prerequisites)

Archer Applications

Configuration Checks, Configuration Check Results, Exception Requests, Remediation Plans

Custom Applications

Potential Unauthorized Activity, Cloud Assets and Services

Requires On-Demand license

Two on-demand applications are required.

Integration components

This section contains high-level integration design information.

Integration diagram

The following diagram shows the relationships between the applications, SQS queues, and data sources in the AWS Security Hub integration.

Diagram

Description automatically generated

Applications

Application

Description

Cloud Assets and Services

The Cloud Assets and Services on-demand application provides a centralized and searchable repository of your organization's cloud infrastructure. You can track the compliance status of key cloud assets and services, assign criticality ratings, and monitor potential unauthorized activity. Cloud assets and services can be automatically created and updated through scans from AWS, Rapid7, NVD, Qualys, Security Center, and more. Key metrics such as resource type, service type, compliance status, and criticality rating provide the ability to identify and monitor the most crucial assets and services to your organization.

Potential Unauthorized Activity

The Potential Unauthorized Activity on-demand application archives suspected malicious activity detected on cloud assets and services. Scan results from sources such as AWS GuardDuty and IAM Access Analyzes identify and prioritize threats such as crypto-currency mining, compromised credentials, and suspected theft found on your cloud infrastructure. Suspected malicious events are categorized by severity and priority, and recommendations for remediation provide actionable details for resolution.

Configuration Checks

The Configuration Checks core application is used to facilitate the automated control testing of technical control procedures utilizing an automated assessment technology. To automate the compliance testing of a technical control procedure, a relationship between the control procedure and the external configuration assessment must be created. This application stores the external checks provided by the assessment technology and allows the company to map their technical control procedures in Archer to the check performed by the external system.

Configuration Check Results

The Configuration Check Results core application stores the scan results fed into Archer through the Data Feed Manager to assess compliance with specified technology baselines. These records contain the date of the scan, the device scanned, the configuration check that was performed, and the result of the check. The user may then address any instances of noncompliance through an exception request or remediation plan.

Exception Requests

The Exception Requests core application allows you to manage the process of granting and expiring exceptions to policies and control standards. Through built-in workflow, the application enables you to ensure that all exceptions are properly reviewed. You can also report on exceptions across the enterprise, monitoring them by control, department, or severity, to visualize the impact of policy exceptions on the business and its compliance posture.

Remediation Plans

The Remediation Plans core application allows you to centrally manage multiple findings and track actual and estimated remediation costs and timeframes. Relating multiple findings in the context of remediation plans allows you to identify larger issues and support informed decision making. Integration with the Archer Threat Management solution and third-party scanning tools also enables you to capture vulnerability and malicious code alerts and the results of automated configuration checks.

Access Roles and Record permissions

Access Role

Description

Cloud Administrator

This role serves as the administrator for the Cloud Risk Monitoring solution, providing create, read, update, and delete access rights to the Potential Unauthorized Activity, Cloud Assets and Services, and Configuration Checks applications. They also have read and update rights to the Configuration Check Results application. The Cloud Administrator is typically responsible for management of their organization’s cloud infrastructure.

Cloud Security Analyst

This role provides create, read, and update access to the Configuration Check Results and Potential Unauthorized Activity applications, and read access to the Configuration Checks and Cloud Assets and Services applications. The Cloud Security Analyst is responsible for managing and mitigating risks facing their cloud infrastructure and services.

Dashboards

Dashboard

Description

AWS Security Hub

The AWS Security Hub dashboard provides a high-level overview of compliance checks and suspected unauthorized activity found on your cloud infrastructure. You can review issues by severity and priority, review cloud resources by type and criticality, open findings, and the distribution of active security findings by configuration check.

AWS GuardDuty

The AWS GuardDuty dashboard provides a summary of potential unauthorized activity observed on your cloud infrastructure.  You can review these findings by severity, monitor issues pending your action, view the distribution of findings across your cloud assets, and identify key trends.

Data Feeds

Data Feed

Description

AWS GuardDuty – JST Data Feed

The AWS GuardDuty – JST data feed is a JavaScript Transporter feed that imports AWS GuardDuty findings from Amazon Simple Queue Service (SQS) queues. The data feed is configured to create new records when no match is found against the preconfigured data feed key, and to update records when new data is found. GuardDuty findings are stored in the Potential Unauthorized Activity application, and associated Cloud infrastructure is recorded in the Cloud Assets and Services application. If you want to change the preconfigured data feed key, you may do so in the provided XSLT.

AWS Security Hub – JST Data Feed

The AWS Security Hub – JST data feed is a JavaScript Transporter feed that imports AWS Security Hub findings from Amazon Simple Queue Service (SQS) queues. The data feed is configured to create new records when no match is found against the preconfigured data feed key, and to update records when new data is found. Security Hub findings are stored in the Configuration Check Results application, and associated Cloud infrastructure is recorded in the Cloud Assets and Services application. If you want to change the preconfigured data feed key, you may do so in the provided XSLT.

Configuring AWS Security Hub

This section provides instructions for configuring AWS Security Hub with the Archer Platform.  This document is not intended to suggest optimum installations or configurations. 

It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products in order to install the required components.

All AWS Security Hub components must be installed and working prior to the integration. Perform the necessary tests to confirm that this is true before proceeding. 

Important: The integration described in this guide is being provided as a reference implementation for evaluation and testing purposes.  It may or may not meet the needs and use cases for your organization.  If additional customizations or enhancements are needed, it is recommended that customers contact Archer Professional Services for assistance.

Configure AWS Options

Configuring Archer

Before you install the AWS Security Hub integration package and data feeds in Archer, you must install all prerequisite use cases and download the following configuration files from the Archer Community:

  • Archer 6.7 AWS Security Hub Integration Install Package.zip

  • AWS Security Hub – JST.dfx5

  • AWS GuardDuty – JST.dfx5

For more information on installing the prerequisite use cases, see “Installing Issues Management” and “Installing IT Controls Assurance” in the Archer Online Documentation.

Install the package

The following tasks detail how to import and install the Archer AWS Security Hub Integration package.

Setting Up AWS Security Hub Data Feeds

The AWS Security Hub Integration includes two data feeds:

  • AWS Security Hub – JST

  • AWS GuardDuty – JST

Using AWS Security Hub

You can use the AWS Security Hub integration to ingest findings from AWS with predefined intervals. The source of each finding determines which application the data is populated in. AWS Security Hub findings are populated in the Configuration Check Results application, and AWS GuardDuty findings are populated in the Potential Unauthorized Activity application.

Certification environment

Date tested: April 2020

Product Name

Version Information

Operating System

Archer

6.7

Virtual Appliance

AWS Security Hub

April 2020

SaaS