New Security & Compliance Service: AWS Security Hub

This morning’s Andy Jassy keynote was followed by the announcement of over 20 new services across a spectrum of AWS categories, including those in Security and Compliance, Database, Machine Learning, and Storage.  

One service that jumped out to me was the AWS Security Hub, currently in Preview. This is a new service designed to help you manage security and compliance by using a single-pane-of-glass approach.

AWS has always treated security as their number one focus and this new service enforces the importance of implementing a culture of security while managing an effective strategy across your AWS account.  AWS Security Hub provides another example of how AWS can help you more effectively and easily find and resolve any security vulnerabilities, identifying unexpected behavioral patterns and non-compliant configurations.

Security Hub is fully integrated with Amazon GuardDuty, Amazon Macie, and Amazon Inspector and uses the data gathered from these existing security services to present any findings within the Security Hub console via a series of interactive graphs, tables, and statistics. In addition, it integrates with a number of AWS partners such as Sumo Logic, Splunk, and Dome9.  This enables you to use Security Hub to receive and present data from not only the AWS security services mentioned but also the security data gathered by tools and services offered by AWS partners that you may already be using as a part of your infrastructure.

For a full list of Security Hub integration partners see here: https://aws.amazon.com/security-hub/partners/

Deploying the AWS Security Hub across multiple accounts is easy since all you need to do is configure the service as a master/member relationship across your accounts to centralize your findings, in much the same way as you would in Amazon GuardDuty.  These centralized findings are presented using a standard format within the console as Security Hub will automatically manage the conversion of security data from GuardDuty, Macie, Inspector, and any partners being used. When findings are generated and found, the Security Hub will prioritize each one allowing you to focus on the key security threats and weaknesses detected across your multi-account configuration.  All findings will remain in the console for 90 days.

The service itself is continually running and provides an automatic assessment of compliance and security best practice checks based on the information being ingested from the different feeds.  These security checks are based on industry standards, such as the Center for Internet Security (CIS) benchmarks. Based on the results of these automatic checks, Security Hub is able to define and present which AWS accounts and resources are most affected by potential security issues allowing you to rectify and remediate them as soon as possible. 

Using Security Hub Insights, you can quickly identify and highlight any ingested data that meet the detail of the insight.  There are a number of pre-configured managed insights to help spot common trends or issues that can lead to a security concern, such as S3 buckets that are exposed to the public.  Additionally, you can also create your own insights allowing you to customize what is important to you and your organization from a security standpoint.

From with the Security Hub console, you are able to carry out a number of immediate actions on the findings, such as being able to send the details of the findings to your engineers via email, chat or even to a ticketing system.  As the service is supported by Amazon CloudWatch Events, you can also configure automated responses based on metric information.

In summary, AWS Security Hub saves you time by centralizing security findings from multiple accounts, from multiple security services and partner tools enabling you to quickly identify and spot security threats, weaknesses, and trends allowing you to provide a more efficient way of maintaining a safe, secure and protected environment.  

For more information on some of the services mentioned within this post, please see our existing courses found here:

Amazon GuardDuty: https://cloudacademy.com/course/understanding-amazon-guardduty/

Amazon GuardDuty is a regional based intelligent threat detection service, the first of its kind offered by AWS, which allows users to monitor their AWS account for unusual and unexpected behavior by analyzing AWS CloudTrail Event Logs, VPC Flow Logs, and DNS Logs. It then uses the data from logs and assesses them against multiple security and threat detection feeds looking for anomalies and known malicious sources, such as IP addresses and URLs.

Amazon Macie: https://cloudacademy.com/course/enforcing-compliance-security-controls-amazon-macie/

The main function of Amazon Macie is to provide an automatic method of detecting, identifying and also classifying data that you are storing within your AWS account.  The service is backed by Machine Learning allowing your data to be actively reviewed as different actions are taken within your AWS account. ML can spot access patterns and user behavior my analyzing CloudTrail event data to alert against any unusual or irregular activity.

Amazon Inspector: https://cloudacademy.com/course/amazon-inspector/

Amazon inspector is a managed service that is used to help you find security vulnerabilities within your EC2 instances and any applications running on them, during any stage of development and deployment.  

Interested in learning more? Schedule a demo with one of our solutions engineers and see how Cloud Academy can help take your organization to the next level.

Avatar

Written by

Stuart Scott

Stuart is the AWS content lead at Cloud Academy where he has created over 40 courses reaching tens of thousands of students. His content focuses heavily on cloud security and compliance, specifically on how to implement and configure AWS services to protect, monitor and secure customer data and their AWS environment.


Related Posts

Alisha Reyes
Alisha Reyes
— December 5, 2019

New on Cloud Academy: AWS Solution Architect Lab Challenge, Azure Hands-on Labs, Foundation Certificate in Cyber Security, and Much More

Now that Thanksgiving is over and the craziness of Black Friday has died down, it's now time for the busiest season of the year. Whether you're a last-minute shopper or you already have your shopping done, the holidays bring so much more excitement than any other time of year. Since our...

Read more
  • AWS
  • AWS solution architect
  • AZ-203
  • Azure
  • cyber security
  • FCCS
  • Foundation Certificate in Cyber Security
  • Google Cloud Platform
  • Kubernetes
Avatar
Cloud Academy Team
— December 4, 2019

Understanding Enterprise Cloud Migration

What is enterprise cloud migration? Cloud migration is about moving your data, applications, and even infrastructure from your on-premises computers or infrastructure to a virtual pool of on-demand, shared resources that offer compute, storage, and network services at scale. Why d...

Read more
  • AWS
  • Azure
  • Data Migration
Wendy Dessler
Wendy Dessler
— November 27, 2019

6 Reasons Why You Should Get an AWS Certification This Year

In the past decade, the rise of cloud computing has been undeniable. Businesses of all sizes are moving their infrastructure and applications to the cloud. This is partly because the cloud allows businesses and their employees to access important information from just about anywhere. ...

Read more
  • AWS
  • Certifications
  • certified
Avatar
Andrea Colangelo
— November 26, 2019

AWS Regions and Availability Zones: The Simplest Explanation You Will Ever Find Around

The basics of AWS Regions and Availability Zones We’re going to treat this article as a sort of AWS 101 — it’ll be a quick primer on AWS Regions and Availability Zones that will be useful for understanding the basics of how AWS infrastructure is organized. We’ll define each section,...

Read more
  • AWS
Avatar
Dzenan Dzevlan
— November 20, 2019

Application Load Balancer vs. Classic Load Balancer

What is an Elastic Load Balancer? This post covers basics of what an Elastic Load Balancer is, and two of its examples: Application Load Balancers and Classic Load Balancers. For additional information — including a comparison that explains Network Load Balancers — check out our post o...

Read more
  • ALB
  • Application Load Balancer
  • AWS
  • Elastic Load Balancer
  • ELB
Albert Qian
Albert Qian
— November 13, 2019

Advantages and Disadvantages of Microservices Architecture

What are microservices? Let's start our discussion by setting a foundation of what microservices are. Microservices are a way of breaking large software projects into loosely coupled modules, which communicate with each other through simple Application Programming Interfaces (APIs). ...

Read more
  • AWS
  • Docker
  • Kubernetes
  • Microservices
Nisar Ahmad
Nisar Ahmad
— November 12, 2019

Kubernetes Services: AWS vs. Azure vs. Google Cloud

Kubernetes is a popular open-source container orchestration platform that allows us to deploy and manage multi-container applications at scale. Businesses are rapidly adopting this revolutionary technology to modernize their applications. Cloud service providers — such as Amazon Web Ser...

Read more
  • AWS
  • Azure
  • Google Cloud
  • Kubernetes
Avatar
Stuart Scott
— October 31, 2019

AWS Internet of Things (IoT): The 3 Services You Need to Know

The Internet of Things (IoT) embeds technology into any physical thing to enable never-before-seen levels of connectivity. IoT is revolutionizing industries and creating many new market opportunities. Cloud services play an important role in enabling deployment of IoT solutions that min...

Read more
  • AWS
  • AWS IoT Events
  • AWS IoT SiteWise
  • AWS IoT Things Graph
  • IoT
Avatar
Cloud Academy Team
— October 23, 2019

Which Certifications Should I Get?

As we mentioned in an earlier post, the old AWS slogan, “Cloud is the new normal” is indeed a reality today. Really, cloud has been the new normal for a while now and getting credentials has become an increasingly effective way to quickly showcase your abilities to recruiters and compan...

Read more
  • AWS
  • Azure
  • Certifications
  • Cloud Computing
  • Google Cloud Platform
Valery Calderón Briz
Valery Calderón Briz
— October 22, 2019

How to Go Serverless Like a Pro

So, no servers? Yeah, I checked and there are definitely no servers. Well...the cloud service providers do need servers to host and run the code, but we don’t have to worry about it. Which operating system to use, how and when to run the instances, the scalability, and all the arch...

Read more
  • AWS
  • Lambda
  • Serverless
Avatar
Stuart Scott
— October 16, 2019

AWS Security: Bastion Hosts, NAT instances and VPC Peering

Effective security requires close control over your data and resources. Bastion hosts, NAT instances, and VPC peering can help you secure your AWS infrastructure. Welcome to part four of my AWS Security overview. In part three, we looked at network security at the subnet level. This ti...

Read more
  • AWS
Avatar
Sudhi Seshachala
— October 9, 2019

Top 13 Amazon Virtual Private Cloud (VPC) Best Practices

Amazon Virtual Private Cloud (VPC) brings a host of advantages to the table, including static private IP addresses, Elastic Network Interfaces, secure bastion host setup, DHCP options, Advanced Network Access Control, predictable internal IP ranges, VPN connectivity, movement of interna...

Read more
  • AWS
  • best practices
  • VPC