<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>findings Archives | Cloudar</title>
	<atom:link href="https://cloudar.be/tag/findings/feed/" rel="self" type="application/rss+xml" />
	<link>https://cloudar.be/tag/findings/</link>
	<description>100% Focus On AWS // 100% Customer Obsession</description>
	<lastBuildDate>Mon, 23 Aug 2021 12:18:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Security Hope</title>
		<link>https://cloudar.be/awsblog/security-hope/</link>
		
		<dc:creator><![CDATA[Andy Mommerency]]></dc:creator>
		<pubDate>Mon, 23 Aug 2021 12:18:26 +0000</pubDate>
				<category><![CDATA[Security & Compliance]]></category>
		<category><![CDATA[findings]]></category>
		<category><![CDATA[security hub]]></category>
		<guid isPermaLink="false">https://www.cloudar.be/?p=18996</guid>

					<description><![CDATA[<p>Knowledge is key. And the first step to a secure system is knowing its weaknesses. AWS Security Hub is an excellent diagnostic tool that provides you with a centralized and comprehensive view of your AWS environment’s security posture. Having a centralized tool has many benefits. The most important one? Your team won’t have to cycle [&#8230;]</p>
<p>The post <a href="https://cloudar.be/awsblog/security-hope/">Security Hope</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Knowledge is key. And the first step to a secure system is knowing its weaknesses. AWS Security Hub is an excellent diagnostic tool that provides you with a centralized and comprehensive view of your AWS environment’s security posture.</span></p>
<p><span style="font-weight: 400;">Having a centralized tool has many benefits. The most important one? Your team won’t have to cycle through several applications to manage dozens, if not hundreds of security alerts every day. It helps them to keep an overview and they will be less likely to miss anything important. You can even set up automated checks!</span></p>
<p><span style="font-weight: 400;">There are just a few things you need to keep in mind: the AWS Security Hub does not offer multi-region tracking at this time and only supports the following standards:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">CIS AWS Foundations</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">AWS Foundational Security Best Practices</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Payment Card Industry Security Standard</span></li>
</ul>
<p><span style="font-weight: 400;">If these current limitations are not a hang-up and if the AWS Security Hub fits your needs, it is an excellent and easy-to-set-up tool that will help you take control of your cybersecurity.</span></p>
<h2><b>I’m ready to go. Where do I start?</b></h2>
<p><span style="font-weight: 400;">When you start using AWS Security Hub, you will most likely be bombarded with alerts. It can be overwhelming, so a structured approach is essential when starting to tackle these issues. </span></p>
<p><span style="font-weight: 400;">People seem to have a natural desire to annihilate their to-do lists and to reach a score of 100% as soon as possible. And while that may look good, it will impact your judgment if you let it.  </span></p>
<p><span style="font-weight: 400;">Instead, realize how important it is to have all this information neatly centralized in one tool. It’s perfectly fine to score less than 100%, as long as you are aware of all issues and create a timeline in which to tackle them. </span></p>
<p><span style="font-weight: 400;">An example policy could be:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Critical: resolve within 1 month</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">High: resolve within 3 months</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Medium: resolve within 6 months</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Low: resolve within 12 months</span></li>
</ul>
<h2><b>Focus on one standard</b></h2>
<p><span style="font-weight: 400;">It is counter-productive to try and deal with all standards at the same time. Is the PCI standard relevant to your business? No? Then leave it unchecked. </span></p>
<p><span style="font-weight: 400;">Of all the standards you do have enabled in the AWS Security Hub, open the one with the worst score (spoiler alert: this is usually the CIS standard).</span></p>
<p><span style="font-weight: 400;">Once you are satisfied with the standard that requires the most work, you can look into any other standards in need of your attention.</span></p>
<h2><b>First things first</b></h2>
<p><span style="font-weight: 400;">Let’s start at the beginning. When you select the second tab in the app, you will only see “failed” controls. By default, this list is sorted by severity, with the most critical issues on top. </span></p>
<p><span style="font-weight: 400;">Let’s focus on the Critical and High severity findings first. After that, you can work on the Medium and Low findings.</span></p>
<p><span style="font-weight: 400;">To successfully deal with security findings, follow these steps:</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Read and understand what the finding is about. Follow the link to the AWS documentation for more details. Find out how many resources it affects (you will find this in the last column) to get an idea of the size, risk, and work to be done.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Decide on your next action and set the workflow status accordingly:</span>
<ol>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Remediate </span><i><span style="font-weight: 400;">(let me do it)</span></i><i><span style="font-weight: 400;"><br />
</span></i><span style="font-weight: 400;">Each finding description offers a link to documented remediation instructions. Once resolved, the finding will clear automatically after some time. Do you want it gone sooner? Sure thing. You can set the workflow status to “resolved” to clear the view immediately.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Notify </span><i><span style="font-weight: 400;">(not my problem)</span></i><i><span style="font-weight: 400;"><br />
</span></i><span style="font-weight: 400;">This workflow status is convenient to keep track of findings that are not your direct responsibility, but are of interest to you. You will still have to hand over the work to the right person, but it’s a nice way to stay in the loop.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Suppress </span><i><span style="font-weight: 400;">(shut up)</span></i><i><span style="font-weight: 400;"><br />
</span></i><span style="font-weight: 400;">Don’t overuse this one! Its purpose is to disable a check for a given resource. Be aware that if you ever disable and enable a standard again, the suppressed findings are reset. You should only use suppress when the check really has no added value for your situation.</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">You could also completely disable a specific control for all current and future resources. It comes with a text field where you can enter the reason for disabling, which is very interesting for future reference. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">Why would you suppress a finding indefinitely? Here’s an example: if your company follows the CIS level 1 standard and only works with virtual MFA devices, control 1.14 (hardware MFA on root) is not necessary – as long as you do have virtual MFA on your root account. In that case, you can disable control 1.14.</span></li>
</ol>
</li>
</ol>
<h2><b>Time to think ahead </b></h2>
<p><span style="font-weight: 400;">While it’s smart to look at the Critical and High severity findings first, it is possible that there are lower severity findings that pose a higher risk to your specific situation. </span></p>
<p><span style="font-weight: 400;">Rifle through all findings to see if anything stands out. Look for findings that relate to your most critical instances first, for example. Guard Duty detected suspicious behavior? Investigate!</span></p>
<p><span style="font-weight: 400;">Lower severity findings typically come in a high number of similar or related issues. In many cases, these can be remediated with a rather low effort. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">For example, you may receive dozens of findings about password requirements, one for each user. These can all be solved by applying an IAM password policy. MFA can be enforced through policies.</span></p>
<p><span style="font-weight: 400;">A missing CloudWatch configuration is another common cause of findings. You can deploy </span><a href="https://github.com/rewindio/aws-security-hub-CIS-metrics"><span style="font-weight: 400;">this script</span></a><span style="font-weight: 400;"> to configure the necessary metrics and alarms.</span></p>
<h2><b>Last but not least</b></h2>
<p><span style="font-weight: 400;">Once you have everything under control and your score reached a value to be proud of, you’re not done. Security never is.</span></p>
<p><span style="font-weight: 400;">Do you have all relevant standards enabled? Do you get recurring findings? Can you automate things? Did you suppress valid findings? Do you receive new findings each time you deploy new resources? Any 3rd party tools you can integrate with Security Hub?</span></p>
<p><span style="font-weight: 400;">As you can see, you can’t rest on your laurels when it comes to security. While a solid, centralized tool is half the battle, we also need you to stay on your toes. Good luck! </span></p>
<p>The post <a href="https://cloudar.be/awsblog/security-hope/">Security Hope</a> appeared first on <a href="https://cloudar.be">Cloudar</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
