Skip to content

andedevsecops/AWS-Security-Hub-Data-Connector

Repository files navigation

Ingest AWS Security Hub Events to Azure Sentinel

Author: Sreedhar Ande

Security Hub is a service that centralizes and organizes alerts and findings from across services. Services include GuardDuty, Macie, IAM Access Analyzer, and AWS Firewall Manager. You can use Security Hub to continuously monitor your environment and perform automated compliance checks.

Security Hub is region-specific, which means you need to turn it on and configure it separately for every region in your account. Ingest all the SecurityHub findings returned by SecurityHub API, ingests only fresh findings based on the LastObservedAt timestamp

Deploy AWS SecurityHub Data connector

  1. Click "Deploy To Azure"/ "Deploy to Azure Gov"

  2. Select the preferred Subscription, Resource Group and Location
    Note
    Best practice : Create new Resource Group while deploying - all the resources of your custom Data connector will reside in the newly created Resource Group

  3. Enter the following value in the ARM template deployment

    "Workspace Id": Azure Log Analytics Workspace Id​
    "Workspace Key": Azure Log Analytics Workspace Key
    "AWS Access Key Id": AWS Access Key
    "AWS Secret Key ID": AWS Secret Key
    "AWS Region Name" : AWS SecurityHub Region
    "CustomLogTableName": Azure Log Analytics Custom Log Table Name	
    

Post Deployment Steps

  1. The TimerTrigger makes it incredibly easy to have your functions executed on a schedule. This sample demonstrates a simple use case of calling your function based on your schedule provided while deploying. If the time interval needs to be modified, it is recommended to change the Function App Timer Trigger accordingly update environment variable "Schedule" (post deployment) to prevent overlapping data ingestion.

    a.	Go to your Resource Group --> Click on Function App `awssecurityhub<<uniqueid>>`
    b.	Click on Function App "Configuration" under Settings 
    c.	Click on "Schedule" under "Application Settings"
    d.	Update your own schedule using cron expression.
    

    Note: For a TimerTrigger to work, you provide a schedule in the form of a cron expression(See the link for full details). A cron expression is a string with 6 separate expressions which represent a given schedule via patterns. The pattern we use to represent every 10 minutes is 0 */10 * * * *. This, in plain text, means: "When seconds is equal to 0, minutes is divisible by 10, for any hour, day of the month, month, day of the week, or year".

  2. Parameterized finding attributes using a environment variable "SecurityHubFilters" which is used to define a condition to filter the returned findings. You can filter by up to 10 finding attributes. For each attribute, you can provide up to 20 filter values.

    Current configured Filter
       {"SeverityLabel": [{"Value": "HIGH", "Comparison": "EQUALS"},{"Value": "CRITICAL", "Comparison": "EQUALS"}],"RecordState": [{"Value": "ACTIVE", "Comparison": "EQUALS"}]}  
    
        Another Filter 
        {
      # look for findings that belong to current account
      # will help deconflict checks run in a master account
      "AwsAccountId": [{"Value": awsAccountId, "Comparison": "EQUALS"}],
      # look for high or critical severity findings
      "SeverityLabel": [
     	{"Value": "HIGH", "Comparison": "EQUALS"},
     	{"Value": "CRITICAL", "Comparison": "EQUALS"},
      ],
      # look for AWS security hub integrations
      # company can be AWS or Amazon depending on service
      "CompanyName": [
     	{"Value": "AWS", "Comparison": "EQUALS"},
     	{"Value": "Amazon", "Comparison": "EQUALS"},
      ],
      # check for Active Records
      "RecordState": [{"Value": "ACTIVE", "Comparison": "EQUALS"}]
     }
    

    Note
    If you want to update/change SecurityHubFilters environment variable, please convert the filter value into single line

  3. Parameterized SecurityHub fresh event duration using environment variable "FreshEventTimeStamp". Value must be in minutes.
    Note
    Azure Function trigger schedule and FreshEventTimeStamp
    Ex: If you want to trigger function every 30 min then values must be
    FreshEventTimeStamp=30
    Schedule=0 */30 * * * *

  4. AWSAccessKey, AWSSecretAccessKey and Workspace Key will be placed as "Secrets" in the Azure KeyVault awssecurityhub<<uniqueid>> with only Azure Function access policy. If you want to see/update these secrets,

    	a. Go to Azure KeyVault "awssecurityhub<<uniqueid>>"
    	b. Click on "Access Policies" under Settings
    	c. Click on "Add Access Policy"
    		i. Configure from template : Secret Management
    		ii. Key Permissions : GET, LIST, SET
    		iii. Select Prinicpal : <<Your Account>>
    		iv. Add
    	d. Click "Save"
    
    

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages