2

We have deployed AWS SecurityHub across our organization using the following configuration:

resource "aws_securityhub_organization_admin_account" "infosec-security-hub" {
  admin_account_id = "12345678"
  provider = aws.org-root
}

resource "aws_securityhub_organization_configuration" "security-hub" {
  auto_enable = true
  provider = aws.infosec
  depends_on = [aws_securityhub_organization_admin_account.infosec-security-hub]
}

The auto_enable property on the organization ensures that new accounts are automatically enrolled into the SecurityHub organization. However, there is a negative side-effect which we want to eliminate - when new accounts are registered, two Security Standards are enabled by default (ex. CIS AWS Foundations Benchmark). Since we leverage AWS Config's organization-level rules (to track the status of the security controls applicable to our environment), this default behavior generates a lot of noise. Therefore, we need to run a script to disable these standards periodically. In other words, we leverage the SecurityHub only as a way to consolidate findings from various security services (ex. Config, IAM Analyzer, and Inspector). My question: (given that we manage SecurityHub at the org-level), how could we overwrite this default of automatically enabling two security standards.

immutableT
  • 439
  • 4
  • 13

0 Answers0