Tenable Vulnerability Management to AWS Security Hub
Project description
Tenable Vulnerability Management to AWS Transformer
:exclamation: | If upgrading from v1 please read the upgrade section |
---|
This tool is designed to consume Tenable.io asset and vulnerability data, transform that data into the AWS Security Hub Finding format, and then upload the resulting data into AWS Security Hub.
The tool can be run as either a one-shot docker container or as a command-line tool. To run as a docker image, you'll need to build the image and then pass the config file to the container.
Requirements
- The Tenable Vulnerability Management Integration for Security Hub must be configured to accept findings from the integration.
- At a minimum the configuration file must have the account id that the events will be sent to. Ideally the region should be configured as well.
- A set of API Keys within TVM should be configured to allow exportation of assets and vulnerability findings from the platform. These keys should be wither configured within the configuration file or as environment variables
Installation
pip install tenable_aws_sechub
Upgrading from v1
If you are upgrading from the original version of the integration, please note that there are some additional steps that need to be taken as the ARN that is used has changed.
- Disable the Tenable.io SecurityHub integration
- Enable the Tenable Vulnerability Management integration
- Configure and run the updated integration (this code)
Configuration
Simply build a configuration file (or use the example file provided) with the following details:
aws_account_id = 12344567890
aws_region = "us-east-1"
access_key = "1234567890abcdef1234567890"
secret_key = "1234567890abcdef1234567890"
Once the configuration file is saved, go ahead and ensure that the AWS CLI can communicate to AWS, or generate the appropriate configuration parameters that AWS needs for their boto3 client. Details for how to do this is documented below:
Running the integration
❯ tvm2aws --configfile /path/to/config.toml
Commandline options
❯ tvm2aws --help
Usage: tvm2aws [OPTIONS]
Tenable to AWS Security Hub vulnerability finding importer.
╭─ Options ───────────────────────────────────────────────────────────────────╮
│ --configfile PATH [default: tvm2aws.toml] │
│ --verbose -v INTEGER RANGE [x<=5] [default: 2] │
│ --help Show this message and exit. │
╰─────────────────────────────────────────────────────────────────────────────╯
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file tenable_aws_sechub-2.0.1.tar.gz
.
File metadata
- Download URL: tenable_aws_sechub-2.0.1.tar.gz
- Upload date:
- Size: 10.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.10.3
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | c209962e2cc9973c3630f48b8a5cae784e3305062ca6d4241535852744db1e96 |
|
MD5 | eff8c0413efd8914b67c5c9f0000a597 |
|
BLAKE2b-256 | ef10eb6e9684f278b3b519b28e2bb2a8f57eb3cfd2edcd3d0ab9252c06fe08cd |
File details
Details for the file tenable_aws_sechub-2.0.1-py3-none-any.whl
.
File metadata
- Download URL: tenable_aws_sechub-2.0.1-py3-none-any.whl
- Upload date:
- Size: 8.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.2 CPython/3.10.3
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e7a32f5dde28270305be105cf6ad24d901dafc7b11a014ce5444d638d4524ff6 |
|
MD5 | 62ce3b8a637165d0b99a5c966d213c21 |
|
BLAKE2b-256 | 099edaca254ed9ef660ed11113036bf78b055ec03754a20478d1e192c0ac42c8 |