Visualizing A Lot of AWS Security Hub Findings
AWS Security Hub is a simple way to collect all of your security data within your AWS Cloud environment.
There are some challenges associated with the service. Namely, getting a handle on a lot of findings from a number of different regions and accounts.
Recently, David Hessler at AWS posted a solution over the AWS Security Blog. My thoughts on that solution in a way-to-big Twitter thread
https://aws.amazon.com/blogs/security/how-to-build-a-multi-region-aws-security-hub-analytic-pipeline/
a thread with my thoughts…
#cloud #security
QuickSight has been one of my favourite AWS services since it’s launch. it’s super easy to use and produces some fantastic visuals you can share w/the team
#cloud #security
like any data, Security Hub findings stay in the region where they were generated
that’s good but you (obviously) want a centralized view
#cloud #security
more on that at https://docs.aws.amazon.com/securityhub/latest/userguide/finding-aggregation.html
#cloud #security
cross-Region finding aggregation is then used in that account to get a view of all of the organization’s Security Hub findings in one place
phew…
#cloud #security
the “eventually” bit is where the solution is a bit frustrating for me
Security Hub outputs to EventBridge (awesome) …
#cloud #security
yikes
#cloud #security
the choices in this solution make sense, it’s just frustration that it’s this complex
#cloud #security
EventBridge => Kinesis Data Firehose ❓
Kinesis Data Firehose => Amazon S3 ❓
AWS Glue => Amazon S3 => Amazon Athena ✅
when I see challenges like this, I often ask, “What else could I use here?”
#cloud #security
…but that’s even more complicated!
…maybe EventBridge => Lambda => S3?
that’s cleaner but could have throttling issues at scale
#cloud #security
pricing is up at https://aws.amazon.com/kinesis/data-firehose/pricing/
but I figure it would be about $5.25 per million Findings
#cloud #security
that same million Findings is goign to clock in around $2.60 …and you would save on the AWS Glue charges because you could normalize from Lambda
#cloud #security
it’s an open format, with details up at https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-findings-format.html
I really like it, but I’m biased as I was involved in the early days
#cloud #security
the shared dashboards are extrememly useful here: https://docs.aws.amazon.com/quicksight/latest/user/sharing-a-dashboard.html
#cloud #security
be sure to check out the full post at https://aws.amazon.com/blogs/security/how-to-build-a-multi-region-aws-security-hub-analytic-pipeline/
…and let me know what you think of this solution in the replies
/ #cloud #security