Understand the resource hierarchy and lifecycle
AWS Security Agent organizes security testing resources in a hierarchical structure that determines what’s shared across your organization and what’s scoped per application. Understanding this structure helps you configure AWS Security Agent effectively and know where to find and manage different resources.
What’s shared across your organization
Some resources in AWS Security Agent are configured once at the organizational level and apply across all your applications and Agent Spaces. These tenant-level resources provide consistency and reduce duplicate configuration work.
| Resource | What it is | Why it’s shared |
|---|---|---|
|
Security requirements |
Organizational security standards that define what AWS Security Agent validates during design and code reviews |
Your security policies apply to all applications. Define them once and AWS Security Agent enforces them everywhere. |
|
GitHub integrations |
Registered GitHub organizations or user accounts authorized to connect with AWS Security Agent |
Register your GitHub organization once, then connect specific repositories to any Agent Space as needed. |
|
IAM Identity Center configurations |
SSO settings that control how users access AWS Security Agent |
Centralized identity management applies across all Agent Spaces in your organization. |
Important
Changes to security requirements affect all future design reviews and code reviews across all Agent Spaces. Existing reviews are not affected.
What’s scoped per Agent Space
Each Agent Space represents a distinct application or project you want to secure. Resources at the Agent Space level are scoped to that specific application, allowing different teams to work independently with their own configurations and assessments.
| Resource | What it is | Why it’s scoped per application |
|---|---|---|
|
Penetration test configurations |
Test configurations for specific features, API endpoints, or functionality within your application |
Each application has unique targets, authentication methods, and scope boundaries specific to that application. |
|
Design reviews |
Individual architectural security assessments of design documents |
Each application has its own architecture and design documents that are assessed independently. |
|
Connected repositories |
GitHub repositories linked to this Agent Space |
Different applications use different repositories. Connecting them at the Agent Space level keeps application boundaries clear. |
|
Code review settings |
Configuration of code review capabilities including connected sources, scan settings, and PR comment enablement |
Each application has its own repositories and security review needs configured independently. |
|
Penetration test remediation settings |
Configuration of which connected repositories can receive automated fix pull requests for penetration testing findings |
Teams control where AWS Security Agent can submit code changes based on their application’s workflow. |
|
User assignments |
Users who have access to this specific Agent Space |
Teams only see security assessments for applications they’re responsible for, keeping work organized and focused. |
Tip
We recommend creating one Agent Space per application or project to maintain clear boundaries between teams and organize security assessments effectively.
How GitHub repositories fit into the hierarchy
GitHub repositories are integrated through a multi-step process that connects organizational resources to specific applications:
-
Register at the tenant level - Authorize the AWS Security Agent GitHub App for your GitHub organization or user account once
-
Connect at the Agent Space level - Select specific repositories to connect to each Agent Space
-
Configure usage per repository - Enable specific capabilities for each connected repository:
-
Code review - Full source code scanning and automated pull request analysis
-
Penetration testing context - Application understanding from source code during penetration tests
-
Automatic code remediation - Automated pull requests with vulnerability fixes for code review and penetration testing findings
-
A single repository can be connected to multiple Agent Spaces with different capabilities enabled in each one.
Key differences between security capabilities
Each security capability in AWS Security Agent follows a different workflow model based on how security teams use it.
Penetration testing: Reusable configurations with independent executions
Penetration tests use a configuration-and-run model that supports iterative security testing:
-
Create once, execute many times - Define a configuration for a specific target (API endpoint, feature area) with scope boundaries, authentication, and test parameters
-
Independent executions - Execute the same configuration multiple times as you improve security. Each execution is independent and generates new findings
This model supports continuous security validation as you develop and deploy improvements.
Design reviews: One-off assessments with cloning
Design reviews are independent assessments that don’t follow a reusable configuration model:
-
Single assessment - Each design review analyzes uploaded documents once against your organization’s security requirements
-
Cannot re-run - Design reviews are not reusable. You cannot re-run the same review
-
Clone for updates - Clone an existing design review to create a new review with the original documents pre-loaded, allowing you to update documents and run a new analysis
This model supports point-in-time architectural security assessments.
Code reviews: Reusable configurations with on-demand scans and automatic PR analysis
Code reviews provide two modes of operation for securing your source code:
-
Full code reviews (web application) - Create code review configurations that select GitHub repositories or S3 sources, then run comprehensive scans on demand. Each run performs static analysis across your full source code and generates findings with remediation guidance. You can re-run the same code review configuration as your code evolves.
-
Pull request comments (GitHub) - Enable automated analysis for connected GitHub repositories. AWS Security Agent automatically reviews pull requests when they are marked as ready for review and posts security findings as comments directly in GitHub.
Both modes use your configured code review settings (security vulnerabilities, custom requirements, or both) and support automated code remediation through pull requests.
Understanding resource relationships
The hierarchy determines where you configure and access different resources:
In the AWS Management Console:
-
Configure tenant-level resources (security requirements, GitHub integrations, IAM Identity Center)
-
Create and manage Agent Spaces
-
Configure Agent Space settings (connected repositories, code review enablement, penetration test remediation)
In the Security Agent Web Application:
-
Create and manage penetration test configurations and test executions
-
Create and manage design reviews
-
Create, manage, and run code reviews against connected repositories and S3 sources
-
View findings from penetration tests, code reviews, and design reviews
In GitHub:
-
View pull request code review findings as pull request comments
-
Receive automated remediation pull requests for code review and penetration testing findings (when enabled in the Agent Space)
Note
Pull request code review findings appear in GitHub. Full code review, penetration test, and design review findings appear in the Security Agent Web Application.