Skip to main content

A library to manage findings in AWS.

Project description

Automated scanning and finding consolidation is a cornerstone in evaluating your security posture. AWS Security Hub is the native solution to perform this job in AWS. As with any scanning and reporting tool, the amount of findings it generates can be overwhelming at first. Also, you may find that some findings are not relevant or have less urgency to fix in your specific situation.

awsfindingsmanagerlib is a framework designed to automatically manage findings recorded by the AWS Security Hub service including it’s AWS service integrations based on a pre-defined and configurable rules list. At its core, awsfindingsmanagerlib aims to reduce noise and help you prioritize real security issues. Currently, it supports suppressing findings, ensuring you can manage irrelevant or less urgent findings effectively.

Documentation: https://awsfindingsmanagerlib.readthedocs.org/en/latest

Development Workflow

The workflow supports the following steps

  • lint

  • test

  • build

  • document

  • upload

  • graph

These actions are supported out of the box by the corresponding scripts under _CI/scripts directory with sane defaults based on best practices. Sourcing setup_aliases.ps1 for windows powershell or setup_aliases.sh in bash on Mac or Linux will provide with handy aliases for the shell of all those commands prepended with an underscore.

The bootstrap script creates a .venv directory inside the project directory hosting the virtual environment. It uses pipenv for that. It is called by all other scripts before they do anything. So one could simple start by calling _lint and that would set up everything before it tried to actually lint the project

Once the code is ready to be delivered the _tag script should be called accepting one of three arguments, patch, minor, major following the semantic versioning scheme. So for the initial delivery one would call

$ _tag –minor

which would bump the version of the project to 0.1.0 tag it in git and do a push and also ask for the change and automagically update HISTORY.rst with the version and the change provided.

So the full workflow after git is initialized is:

  • repeat as necessary (of course it could be test - code - lint :) )

    • code

    • lint

    • test

  • commit and push

  • develop more through the code-lint-test cycle

  • tag (with the appropriate argument)

  • build

  • upload (if you want to host your package in pypi)

  • document (of course this could be run at any point)

Important Information

This template is based on pipenv. In order to be compatible with requirements.txt so the actual created package can be used by any part of the existing python ecosystem some hacks were needed. So when building a package out of this do not simple call

$ python setup.py sdist

as this will produce an unusable artifact with files missing. Instead use the provided build and upload scripts that create all the necessary files in the artifact.

License info

While the project is released under the Apache 2 license, scripts under _CI/scripts are released under an MIT license as stated on their header.

History

0.1.0 (26-04-2024)

  • Initial release.

0.1.1 (19-06-2024)

  • Fix s3 backend.

0.1.2 (19-06-2024)

  • Bump dependencies.

1.0.0 (26-07-2024)

  • Fix event handling.

1.0.1 (02-10-2024)

  • Bump template python version to 3.11.

1.0.2 (04-10-2024)

  • Fix development dependencies.

1.0.3 (04-10-2024)

  • Bump twine to latest version to fix upload on pipeline.

1.0.4 (14-10-2024)

  • Bump template python version to 3.12.

  • Bugfixes.

1.1.0 (21-11-2024)

  • Adds support for SecurityHub Integration findings

1.2.0 (24-12-2024)

  • Updates default SecurityHub filter to fix issues with SecurityHub Integration findings support.

  • Adjusted filtering logic to align with SecurityHub filtering: When both match_on options: tags and resource_id_regexps are specified, they are now combined using an AND condition instead of an OR condition.

  • Introduce pagesize.

1.3.0 (07-04-2025)

  • Adds support for filtering findings by region.

  • Bump dependencies.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

awsfindingsmanagerlib-1.3.0.tar.gz (105.0 kB view details)

Uploaded Source

File details

Details for the file awsfindingsmanagerlib-1.3.0.tar.gz.

File metadata

  • Download URL: awsfindingsmanagerlib-1.3.0.tar.gz
  • Upload date:
  • Size: 105.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.12.7

File hashes

Hashes for awsfindingsmanagerlib-1.3.0.tar.gz
Algorithm Hash digest
SHA256 4b8dfa61710ae32f5750cf66b2654070440b29986512c70beb357df278ae347e
MD5 2c55c46a9375e662440eb232391aa390
BLAKE2b-256 e38f995726ea36004d31c120d5ae52f9ef6ebb56d75f5dd1e8977010e29cb0b3

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page