Skip to content

Latest commit

 

History

History
43 lines (29 loc) · 1.74 KB

aws-security-hub.md

File metadata and controls

43 lines (29 loc) · 1.74 KB

AWS Security Hub

Upload findings to Security Hub

In the following example using the template asff.tpl, ASFF file can be generated.

$ AWS_REGION=us-west-1 AWS_ACCOUNT_ID=123456789012 trivy image --format template --template "@contrib/asff.tpl" -o report.asff golang:1.12-alpine

ASFF template needs AWS_REGION and AWS_ACCOUNT_ID from environment variables.

The Product ARN field follows the pattern below to match what AWS requires for the product resource type.

"ProductArn": "arn:aws:securityhub:{{ env "AWS_REGION" }}:{{ env "AWS_ACCOUNT_ID" }}:product/aquasecurity/trivy",

Then, you can upload it with AWS CLI.

$ aws securityhub batch-import-findings --findings file://report.asff

Note

The batch-import-findings command limits the number of findings uploaded to 100 per request. The best known workaround to this problem is using jq to run the following command

jq '.[:100]' report.asff 1> short_report.asff

Customize

You can customize asff.tpl

$ export AWS_REGION=us-west-1
$ export AWS_ACCOUNT_ID=123456789012
$ trivy image --format template --template "@your-asff.tpl" -o report.asff golang:1.12-alpine

Reference

https://aws.amazon.com/blogs/security/how-to-build-ci-cd-pipeline-container-vulnerability-scanning-trivy-and-aws-security-hub/