Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit d20603f

Browse files
authored
Merge pull request Hacker0x01#458 from h3xar0n/patch-1
add AWS Security Hub documentation
2 parents 69f5b9f + aa6288c commit d20603f

File tree

7 files changed

+116
-15
lines changed

7 files changed

+116
-15
lines changed
Lines changed: 93 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,93 @@
1+
---
2+
title: "AWS Security Hub Integration"
3+
path: "/programs/aws-security-hub-integration.html"
4+
id: "programs/aws-security-hub-integration"
5+
---
6+
7+
## Introduction
8+
9+
The AWS Security Hub integration exchanges vulnerability findings between HackerOne and Security Hub, streamlining workflows to accelerate security actions. By consolidating and routing vulnerability intelligence from HackerOne to AWS Security Hub, the integration delivers greater visibility into crucial gaps that could lead to a cyberattack.
10+
11+
AWS customers can sync all HackerOne vulnerability findings and use AWS Security Hub as the single console for management and prioritization. They can also compare AWS Security Hub findings with those found by the HackerOne community to see duplicates, understand status, and plan remediation, as shown in Figure 2 below.
12+
13+
With consolidated vulnerability reports, unified findings for more informed responses, and faster time to remediation, AWS customers can improve application security. HackerOne’s AWS Security Hub integration means severe vulnerabilities are routed to the right people at the right time to increase security team efficiencies, improve reporting, and reduce application exploitation.
14+
15+
## Prerequisites
16+
17+
- An AWS account with [AWS Security Hub](https://aws.amazon.com/security-hub/) enabled for the region with your workload. (If you are using AWS Organizations and consolidating findings from Security Hub in various regions and accounts, choose the region and account with the desired level of visibility.)
18+
- The AWS CLI configured to deploy a serverless application to the same region where AWS Security Hub is enabled. If not, use the following steps:
19+
1. Install [the AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-install.html).
20+
1. Retrieve the AWS Access Key ID and the AWS Secret Access Key for an identity that has permission to create an API Gateway, Lambda, and a new IAM Role for the Lambda to connect to Security Hub.
21+
1. Use `aws configure` to set the credentials and the region where you have Security Hub enabled.
22+
- A HackerOne program account with the ability to configure [Webhooks](https://docs.hackerone.com/programs/webhooks.html) to send reports and the ability to generate [API tokens](https://docs.hackerone.com/programs/api-tokens.html) to receive reports.
23+
24+
## HackerOne to Security Hub
25+
26+
### Overview
27+
28+
This integration creates a Webhook in HackerOne that sends hacker reports to AWS Security Hub. It is ideal if you use AWS Security Hub to analyze and triage issues in your AWS account, and your purpose for integrating with HackerOne is to consume findings from researchers alongside other tools in your AWS account.
29+
30+
### Architecture
31+
32+
![h1-sh](./images/h1-sh.png)
33+
34+
The HackerOne webhook targets an API Gateway, which forwards the request to a Lambda Function. The Lambda then reformats the payload to AWS Security Hub Finding Format (ASFF) and sends each finding to Security Hub. As a result, those with access to a Security Hub will be able to see the imported HackerOne reports from within Security Hub.
35+
36+
### Setup
37+
38+
Ensure that you have met all of the above [Prerequisites](#prerequisites).
39+
40+
In addition, you need the following:
41+
42+
1. Navigate to [Security Hub > Integrations](https://console.aws.amazon.com/securityhub/home#/integrations) and search for `HackerOne`.
43+
1. Click *Accept findings* in the **HackerOne: Vulnerability Intelligence** card.
44+
1. Choose an S3 bucket to host the configuration; the bucket should not be public, but the IAM role you are using must have read and write access to it.
45+
1. Clone the [hackerone-to-aws-security-hub](https://github.com/Hacker0x01/hackerone-to-aws-security-hub) repository.
46+
1. Use the bash script in the repository to build and deploy the serverless app.
47+
1. Create a [HackerOne Webhook](https://docs.hackerone.com/programs/webhooks.html).
48+
1. Enter the URL output from build process as the Webhook target.
49+
1. Configure the webhook to trigger based on events that you want to trigger creation or updates of findings. You may start with "All events will trigger the webhook," or specify the triggering events.
50+
1. To verify a successful setup, test out the steps below.
51+
52+
### Usage
53+
54+
1. In your HackerOne account, select a report in the Inbox.
55+
1. Perform an action on the report that corresponds to a trigger you have configured for the webhook.
56+
1. Visit Security Hub in the account and region you declared in the deployment.
57+
1. Navigate to Findings and filter for “Company name” / “is” / “HackerOne” to see all imported reports, or check for the most recent events.
58+
59+
60+
## Security Hub to HackerOne
61+
62+
### Overview
63+
64+
This integration creates a custom action for Security Hub to send findings to HackerOne. It is ideal if you use Security Hub to consolidate findings from AWS, and your purpose for integrating with HackerOne is to provide analysts with more context into the environment researchers are testing.
65+
66+
### Architecture
67+
68+
![sh-h1](./images/sh-h1.png)
69+
70+
The custom action in Security Hub uses EventBridge to forward specific findings to a Lambda. The Lambda then divides and reformats the findings to meet HackerOne’s report format, and sends each finding individually to HackerOne’s Create Report API. As a result, those with access to a specific HackerOne program will be able to see the imported Security Hub findings from within HackerOne.
71+
72+
### Setup
73+
74+
Ensure that you have met all of the above [Prerequisites](#prerequisites).
75+
76+
1. Create an API token and identifier for the HackerOne API. (https://docs.hackerone.com/programs/api-tokens.html). Only use the identifier for this integration so it is clear that the API calls are coming from your AWS account and no other source.
77+
1. Clone the [aws-security-hub-to-hackerone](https://github.com/Hacker0x01/aws-security-hub-to-hackerone) repository.
78+
1. Run `aws cloudformation deploy --template-file eventbridgerule.yml --stack-name <STACK_NAME> --capabilities CAPABILITY_IAM`, and input the identifier and API token from the step above.
79+
1. Navigate to [AWS Security Hub > Settings > Custom Actions](https://console.aws.amazon.com/securityhub/home#/settings/actions).
80+
1. Click **Create custom action**.
81+
1. Set *Action name* to `Send to HackerOne` and the *Description* to anything you like.
82+
1. Set *Custom action ID* to `SendFindingToH1` ⚠️ Important: you must use this ID in order to connect to the rule in the template ⚠️.
83+
1. To verify a successful setup, test out the steps below.
84+
85+
### Usage
86+
87+
1. Visit Security Hub in the AWS console. Ensure that you are in the region and account that you declared when you deployed the integration.
88+
1. Navigate to Findings and select one or more findings by ticking the box on the left of each row.
89+
1. Click the Actions dropdown button at the top right of the findings list.
90+
1. Select “Send to HackerOne”
91+
1. Switch to your program at HackerOne, and see the findings listed under new reports.
92+
93+
Contact your HackerOne program team if you have any issues creating tokens for the HackerOne API, and contact AWS Support if you have any issues with resources in your AWS account.
Loading

docs/programs/images/both-aws.png

45.1 KB
Loading

docs/programs/images/h1-sh.png

30.7 KB
Loading

docs/programs/images/sh-h1.png

29.4 KB
Loading

docs/programs/supported-integrations.md

Lines changed: 21 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,12 @@ HackerOne currently supports these integrations:
1414
</div>
1515
<div class="logo-text">Assembla</div>
1616
</a>
17+
<a class="integration-button" href="aws-security-hub-integration.html">
18+
<div class="logo">
19+
<img src="./images/aws_security_hub_logo.png" />
20+
</div>
21+
<div class="logo-text">AWS Security Hub</div>
22+
</a>
1723
<a class="integration-button" href="azure-devops-integration.html">
1824
<div class="logo">
1925
<img src="./images/azure-devops-logo.png" />
@@ -26,15 +32,15 @@ HackerOne currently supports these integrations:
2632
</div>
2733
<div class="logo-text">Bugzilla</div>
2834
</a>
35+
</div>
36+
37+
<div class="int-button-container">
2938
<a class="integration-button" href="freshdesk-integration.html">
3039
<div class="logo">
3140
<img src="./images/freshdesk_logo.png" />
3241
</div>
3342
<div class="logo-text">Freshdesk</div>
3443
</a>
35-
</div>
36-
37-
<div class="int-button-container">
3844
<a class="integration-button" href="github-integration.html">
3945
<div class="logo">
4046
<img src="./images/github_logo.png" />
@@ -53,15 +59,15 @@ HackerOne currently supports these integrations:
5359
</div>
5460
<div class="logo-text">HackEDU</div>
5561
</a>
62+
</div>
63+
64+
<div class="int-button-container">
5665
<a class="integration-button" href="ibm-security-soar.html">
5766
<div class="logo">
5867
<img src="./images/ibm_resilient_logo.png" />
5968
</div>
6069
<div class="logo-text">IBM Security SOAR</div>
6170
</a>
62-
</div>
63-
64-
<div class="int-button-container">
6571
<a class="integration-button" href="jira-integration.html">
6672
<div class="logo">
6773
<img src="./images/jira_logo.png" />
@@ -80,15 +86,15 @@ HackerOne currently supports these integrations:
8086
</div>
8187
<div class="logo-text">Kenna Security</div>
8288
</a>
89+
</div>
90+
91+
<div class="int-button-container">
8392
<a class="integration-button" href="mantisbt-integration.html">
8493
<div class="logo">
8594
<img src="./images/mantisbt-logo.png" />
8695
</div>
8796
<div class="logo-text">MantisBT</div>
8897
</a>
89-
</div>
90-
91-
<div class="int-button-container">
9298
<a class="integration-button" href="microsoft-teams.html">
9399
<div class="logo">
94100
<img src="./images/microsoft_teams_logo.png" />
@@ -107,15 +113,15 @@ HackerOne currently supports these integrations:
107113
</div>
108114
<div class="logo-text">PagerDuty</div>
109115
</a>
116+
</div>
117+
118+
<div class="int-button-container">
110119
<a class="integration-button" href="phabricator-integration.html">
111120
<div class="logo">
112121
<img src="./images/phabricator_logo.png" />
113122
</div>
114123
<div class="logo-text">Phabricator</div>
115124
</a>
116-
</div>
117-
118-
<div class="int-button-container">
119125
<a class="integration-button" href="redmine-integration.html">
120126
<div class="logo">
121127
<img src="./images/redmine_logo.png" />
@@ -134,15 +140,15 @@ HackerOne currently supports these integrations:
134140
</div>
135141
<div class="logo-text">Slack</div>
136142
</a>
143+
</div>
144+
145+
<div class="int-button-container">
137146
<a class="integration-button" href="splunk-integration.html">
138147
<div class="logo">
139148
<img src="./images/splunk_logo.png" />
140149
</div>
141150
<div class="logo-text">Splunk</div>
142151
</a>
143-
</div>
144-
145-
<div class="int-button-container">
146152
<a class="integration-button" href="sumo-logic-integration.html">
147153
<div class="logo">
148154
<img src="./images/sumo_logic_logo.png" />

src/pages/programs/programs-nav.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,6 +171,8 @@
171171
path: /programs/api-tokens.html
172172
- title: Assembla
173173
path: /programs/assembla-integration.html
174+
- title: AWS Security Hub
175+
path: /programs/aws-security-hub-integration.html
174176
- title: Azure DevOps
175177
path: /programs/azure-devops-integration.html
176178
- title: Bugzilla

0 commit comments

Comments
 (0)