security-hub

cloudposse/security-hub/aws

Terraform Module HCL AWS

Terraform module to provision AWS Security Hub

Install
module "security-hub" {
source = "cloudposse/security-hub/aws"
version = "0.12.2"
}
plain text: /constructs/tfmod-cloudposse-security-hub-aws/install.txt
⭐ Source on GitHub 📦 Registry page
README

Terraform module to deploy AWS Security Hub. > [!TIP] > #### 👽 Use Atmos with Terraform > Cloud Posse uses atmos to easily orchestrate multiple environments using Terraform. > Works with Github Actions, Atlantis, or Spacelift. > > > Watch demo of using Atmos with Terraform > > Example of running atmos to manage infrastructure from our Quick Start tutorial. > Introduction This module enables AWS Security Hub in one region of one account and optionally sets up an SNS topic to receive notifications of its findings. Usage For a complete example, see examples/complete. For automated tests of the complete example using bats and Terratest (which tests and deploys the example on AWS), see test. Here's how to invoke this module in your projects: ``hcl module "securityhub" { source = "cloudposse/sec

Inputs (27)
NameTypeDescriptionDefault
enabledboolSet to false to prevent the module from creating any resourcesnull
tenantstringID element _(Rarely used, not included by default)_. A customer identifier, indinull
enabled_standardslist(any)A list of standards/rulesets to enable See https://registry.terraform.io/provid[]
imported_findings_notification_arnstringThe ARN for an SNS topic to send findings notifications to. This is only used ifnull
stagestringID element. Usually used to indicate role, e.g. 'prod', 'staging', 'source', 'bunull
label_orderlist(string)The order in which the labels (ID elements) appear in the `id`. Defaults to ["nanull
enable_default_standardsboolFlag to indicate whether default standards should be enabledtrue
subscribersmap(object({ protocol = stRequired configuration for subscibres to SNS topic.{}
finding_aggregator_linking_modestringLinking mode to use for the finding aggregator. The possible values are: - "ALL_REGIONS"
finding_aggregator_regionslist(string)A list of regions to aggregate findings from. This is only used if `finding_ag[]
namespacestringID element. Usually an abbreviation of your organization name, e.g. 'eg' or 'cp'null
regex_replace_charsstringTerraform regular expression (regex) string. Characters matching the regex will null
labels_as_tagsset(string)Set of labels (ID elements) to include as tags in the `tags` output. Default is [ "default" ]
cloudwatch_event_rule_pattern_detail_typestringThe detail-type pattern used to match events that will be sent to SNS. For mor"Security Hub Findings - Imported"
finding_aggregator_enabledboolFlag to indicate whether a finding aggregator should be created If you want to false
contextanySingle object for setting entire context at once. See description of individual { "additional_tag_map": {}, "attribu
namestringID element. Usually the component or solution name, e.g. 'app' or 'jenkins'. Thinull
label_value_casestringControls the letter case of ID elements (labels) as included in `id`, set as tagnull
environmentstringID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'stnull
attributeslist(string)ID element. Additional attributes (e.g. `workers` or `cluster`) to add to `id`, []
Outputs (3)
enabled_subscriptions — A list of subscriptions that have been enabled
sns_topic — The SNS topic that was created
sns_topic_subscriptions — The SNS topic that was created
Resources (5)
aws_cloudwatch_event_ruleaws_cloudwatch_event_targetaws_securityhub_accountaws_securityhub_finding_aggregatoraws_securityhub_standards_subscription
Details
FrameworkTerraform Module
LanguageHCL
Version0.12.2
Cloud AWS
★ Stars22
Forks21
Total downloads3.0M
Inputs27
Outputs3
Resources5
Examples1
Submodules1
LicenseApache-2.0
Namespacecloudposse
Updated