Security Hub - AWS Foundational Security Best Practices

0

Hi,

I am working on resolving various AWS CIS Benchmarks in Security Hub and I am wondering if there is any way to re-run or manually trigger to re-check the rule if compliance is met. I've updated multiple configurations to comply with rules that are currently at failed status, but I don't see an option to force security hub to re-evaluate whether various benchmarks are currently in compliance or not.

Thanks!

2개 답변
2
수락된 답변

AWS Security Hub consolidates findings from other sources, such as AWS Config. It doesn't evaluate the compliance policies directly. Rather, every 12 hours AWS Config reports failed compliance rules to AWS Security Hub, and Security Hub asserts findings for each of the Security Standards.

I've found 2 ways to re-trigger the Config rules:

  1. Disable/enable the CIS standard. I would not recommend doing this often, and it's not practical for routine use. I use it when testing automated remediations.
  2. Determine the related AWS Config rule and use the AWS Config console to re-evaluate the rule.

Otherwise, the Config rules are evaluated every 12 hours.

To find the config rule, open the finding json and look for RelatedAWSResources:0:

"RelatedAWSResources:0/name": "securityhub-restricted-ssh-33f8347e",
"RelatedAWSResources:0/type": "AWS::Config::ConfigRule",

In AWS Config, search for the rule name, ex. "securityhub-restricted-ssh". Open the rule, click Actions and select Re-evaluate.

To show the status of findings that you have remediated, use the Workflow Status and Notes fields. Set WorkFlow Status to Resolved and use Notes to record steps taken. This reduces the need to re-evaluate the rule, though it still shows a FAILED status until the next config rule eval.

AWS
Mike_O
답변함 2년 전
profile picture
전문가
검토됨 4일 전
profile picture
전문가
검토됨 한 달 전
  • Thank you! Determine the related AWS Config rule and reevaluating worked.

0

In SecurityHub it checks and updates the compliance of enabled Security Standards every 24 hours - see https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-standards-view-controls.html for some additiona; detail on that. So while there is no way to manually trigger the checks, it will be updated within 24 hours.

profile pictureAWS
답변함 2년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인