Enabling Security Hub manually
After you attach the required policy to the IAM identity, you use that identity to enable Security Hub. You can enable Security Hub from the AWS Management Console or the API.
Security Hub also provides a script in GitHub that allows you to enable multiple accounts across Regions.
Attaching the required IAM policy to the IAM identity
The IAM identity (user, role, or group) that you use to enable Security Hub must have the required permissions.
If you enable the integration with AWS Organizations, then accounts in your organization have Security Hub enabled automatically. The required permissions also are handled automatically.
Accounts that are not managed using Organizations must enable Security Hub manually. The IAM identity (user, role, or group) that you use to enable Security Hub must have the required permissions.
To grant the permissions required to enable Security Hub, attach the Security Hub managed policy AWSSecurityHubFullAccess to an IAM user, group, or role.
Enabling Security Hub (console)
When you enable Security Hub from the console, you also have the option to enable the supported security standards.
To enable Security Hub
-
Use the credentials of the IAM identity to sign in to the Security Hub console.
-
When you open the Security Hub console for the first time, choose Enable AWS Security Hub.
-
On the welcome page, Security standards lists the security standards that Security Hub supports.
To enable a standard, select its check box.
To disable a standard, clear its check box.
You can enable or disable a standard or its individual controls at any time. For information about the security standards and how to manage them, see Security controls and standards in AWS Security Hub.
-
Choose Enable Security Hub.
Enabling Security Hub (Security Hub API, AWS CLI)
To enable Security Hub, you can use an API call or the AWS Command Line Interface.
To enable Security Hub (Security HubAPI, AWS CLI)
-
Security Hub API – Use the
EnableSecurityHub
operation. When you enable Security Hub from the API, it automatically enables these security standards.-
CIS AWS Foundations Benchmark
-
AWS Foundational Security Best Practices Standard
If you do not want to enable these standards, then set
EnableDefaultStandards
tofalse
.You can also use the
Tags
parameter to assign tag values to the hub resource. -
-
AWS CLI – At the command line, run the
enable-security-hub
command. To enable the default standards, include--enable-default-standards
. To not enable the default standards, include--no-enable-default-standards
.aws securityhub enable-security-hub [--tags
<tag values>
] [--enable-default-standards | --no-enable-default-standards]Example
aws securityhub enable-security-hub --enable-default-standards --tags '{"Department": "Security"}'
After you enable Security Hub, you can enable or disable standards. See Enabling and disabling security standards.
Enabling Security Hub (Multi-account script)
The Security Hub multi-account enablement script in GitHub
The script automatically enables resource recording for all resources, including global resources, in all Regions. It does not limit recording of global resources to a single Region.
There is a corresponding script to disable Security Hub across accounts and Regions.
The readme file provides details on how to use the script. It includes the following information:
-
How to add the required IAM policy to the accounts
-
How to configure the execution environment
-
How to run the script