Skip to content

aws-samples/aws-control-tower-securityhub-enabler

Folders and files

NameName
Last commit message
Last commit date

Latest commit

bceb96d · Nov 28, 2023

History

37 Commits
Mar 20, 2020
Nov 28, 2023
Mar 20, 2020
Oct 9, 2020
Sep 25, 2020
Sep 25, 2020
Feb 27, 2020
Sep 2, 2021
Nov 28, 2023

Centralize SecurityHub

Installing this Customization will enable Security Hub in all Control Tower managed accounts, with the Audit account acting as the default Security Hub Master.

It can also be run in non-Control Tower managed Organizations, if the SecurityHub Region Filter and All OU Filters are selected during deployment.

This is done by deploying a SecurityHub Enabler lambda function in the master account. It runs periodically and checks each Control Tower managed account/region to ensure that they have been invited into the master SecurityHub account and that SecurityHub is enabled. It is also triggered by Control Tower Lifecycle events to ensure there is minimal delay between new accounts being created and Security Hub being enabled in them.

Logical Flow

Attributions

The original code for automating SecurityHub enablement in AWS accounts is present here. This has been extended to work with Control Tower.

The cfnResponse module has recently been impacted by removal of the vendored version of requests from botocore, so the send function has been directly imported from here.

Instructions

  1. Upload the src/securityhub_enabler.zip file to an S3 bucket, note the bucket name

  2. Gather other information for deployment parameters:

    • In AWS Organizations, look on the Settings page for the Organization ID. It will be o-xxxxxxxxxx
    • In AWS Organizations, look on the Accounts page for the Audit account ID.
  3. Launch the CloudFormation stack using the aws-control-tower-securityhub-enabler.template file as the source. The values noted in the steps above will be entered as parameters to the CloudFormation stack.