Skip to content

manasiprabhavalkar/aws-security-hub-plugin

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

49 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Launch Stack

AWS Security Hub Plugin

Send Aqua's security findings to the AWS Security Hub

AWS Security Hub Plugin is compatible with Aqua Cloud Native Security Platform 4.x

Description

The Aqua Security integration with AWS Security Hub is enabled via a log-forwarder enabler that fetches security events from Aqua and pushes them to the AWS Security Hub. The log-forwarder component is installed using a CloudFormation script available in GitHub. This script deploys the log-forwarded computing instance inside ECS Fargate and connects it with both an Aqua instance and the AWS Security Hub. The script manages the entire installation process including creating IAM Role with the permission to read and write data from/to the AWS Security Hub and attaches this role to the created instance (task).

Events reported to Security Hub

Aqua reports the following security events to the Security Hub -

  • Images that failed the security scan and are non-compliant
  • Attempts to push non-complaint or unregistered images to the runtime environment
  • Suspicious or unauthorized activity in the container
  • Suspicious or unauthorized network activity at a container level

Example: Image scan revealred vulnerabilities
Image Scan Revealed Vulnerabilities

Example: Blocked an unauthorized program run Blocked Unauthorized Program run

Implementation Requirements

  • A VPC created
  • Existing VPC CIDR range for the new subnet
  • AWS Security Hub enabled
  • ECS Fargate cluster to run the enabler

Before deployment

  1. Pull the AWS log-collector image from Aqua's repository and push to ECR. The CloudFormation template will later push this image to your ECS Fargate cluster:
    • Login to the Aqua Registry with your Aqua credentials: docker login registry.aquasec.com -u <AQUA_USERNAME> -p <AQUA_PASSWORD>
    • Pull the AWS log-collector image with the commands: docker pull aquasec/log-collector:aws-1.4
    • Push the image to ECR
  2. Make sure that the Aqua database is available through the standard Postgresql port: 5432

Deployment: CloudFormation Management Console

  1. Click the Launch Stack icon at the top of this README.md file. This will take you to the Create stack function of the AWS CloudFormation Management Console.
  2. Load the CF template in this repository - AwsSecHubEcsCF.yaml
  3. Ensure that your AWS region is set to where you want to deploy the script.
  4. Click “Next”.
  5. Set or modify any of the parameters below:
    • DockerImage = the path to the log-collector image on ECR (e.g. [account id].dkr.ecr.[region].amazonaws.com/aquasec/log-collector:aws-1.4)
    • ContainerCpu = CPU "size"; 1024 = 1 full CPU
    • ContainerMemory = Memory size in megabytes
    • VPC = ID of the VPC where the script will be deployed
    • CIDR = CIDR for the newly created subnet inside selected VPC. Must be within selected VPC CIDR range
    • DBConnectionString = Postgresql URI formatted connection string for Aqua's audit DB (e.g. postgresql://{hostname or ip}:5432/slk_audit?user=postgres&password={db-password})
    • ECSCluster = The name of the ECSCluster to host the log-forwarder image
    • LogGroupName = Enter log group name for the log-forwarder
  6. Click “Next” to create the stack.
  7. Acknowledge that the new IAM role will be created automatically while deploying the script
  8. Run the AWS create-stack CLI command. Deployment time depends on the bootstrap time of the application inside the Docker image.

Example: CloudFormation Stack Creation CloudFormation

Validate deployment

To validate the integration, go to the Aqua Security console and choose to scan a few of the images. The scanning results for these images should be sent as findings to the AWS Security Hub.

Troubleshooting and Support

You can check the log-collector logs for errors through the ECS Cluster console view. For support and questions please contact us at - [email protected].

Disclaimer

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

About

Aqua Security AWS Security Hub plugin

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published