This workshop is designed to get you familiar with AWS Security Hub so that you can better understand how you would use it in your own AWS environment(s). This workshop is broken into two sections. The first section will guide you through a demonstration of the features and functions of Security Hub. The second section will show you how to use Security Hub to import findings from different data sources, analyze findings so you can prioritize response work, and implement responses to findings to help improve your security posture.
- Level: Intermediate
- Duration: 2 - 3 hours
- CSF Functions: Detect, Respond
- CAF Components: Detective, Responsive
- Prerequisites: AWS Account, Admin IAM User
Your company is new to the cloud and is steadily migrating workloads into your cloud environment. To detect security events you are using a mix of 3rd party services, custom scripts, and AWS services. As a security analyst you are responsible for establishing a solution that will give visibility into security findings related to your AWS environment so that you can properly prioritize and respond to findings.
For this workshop there will be multiple pieces of infrastructure and AWS services deployed in order to facilitate creation of security findings in Security Hub.
Multiple EC2 instances will be launched to facilitate the generation of findings from GuardDuty & Inspector. Additionally these instances will be used to help with demonstration of integration of custom findings into Security Hub.
Multiple AWS services will be configured in the workshop to help facilitate the generation of Security Hub findings. These services include:
- AWS Security Hub
- Amazon GuardDuty
- Amazon Secrets Manager
- Amazon Inspector
- AWS Config
- AWS IAM Access Analyzer
Please use us-west-2 (Oregon) or us-east-1 (Virgina) for this workshop.
This workshop is broken up into setup and then four modules:
Your contributions are always welcome! Please have a look at the contribution guidelines first.
The documentation is made available under the Creative Commons Attribution-ShareAlike 4.0 International License. See the LICENSE file.
The sample code within this documentation is made available under the MIT-0 license. See the LICENSE-SAMPLECODE file.