Skip to main content

Tenable Vulnerability Management to AWS Security Hub

Project description

Tenable Vulnerability Management to AWS Transformer

:exclamation: If upgrading from v1 please read the upgrade section

This tool is designed to consume Tenable.io asset and vulnerability data, transform that data into the AWS Security Hub Finding format, and then upload the resulting data into AWS Security Hub.

The tool can be run as either a one-shot docker container or as a command-line tool. To run as a docker image, you'll need to build the image and then pass the config file to the container.

Requirements

  • The Tenable Vulnerability Management Integration for Security Hub must be configured to accept findings from the integration.
  • At a minimum the configuration file must have the account id that the events will be sent to. Ideally the region should be configured as well.
  • A set of API Keys within TVM should be configured to allow exportation of assets and vulnerability findings from the platform. These keys should be wither configured within the configuration file or as environment variables

Installation

pip install tenable_aws_sechub

Upgrading from v1

If you are upgrading from the original version of the integration, please note that there are some additional steps that need to be taken as the ARN that is used has changed.

  1. Disable the Tenable.io SecurityHub integration
  2. Enable the Tenable Vulnerability Management integration
  3. Configure and run the updated integration (this code)

Configuration

Simply build a configuration file (or use the example file provided) with the following details:

access_key = "1234567890abcdef1234567890"
secret_key = "1234567890abcdef1234567890"

[[aws_profile]]
name = "default"
accounts = [1234567890]
region = "us-east-1"

Once the configuration file is saved, go ahead and ensure that the AWS CLI can communicate to AWS, or generate the appropriate configuration parameters that AWS needs for their boto3 client. Details for how to do this is documented below:

  1. Boto3 Configuration
  2. AWS CLI Config

Running the integration

❯ tvm2aws --configfile /path/to/config.toml

Commandline options

❯ tvm2aws --help

 Usage: tvm2aws [OPTIONS]

 Tenable to AWS Security Hub vulnerability finding importer.

╭─ Options ───────────────────────────────────────────────────────────────────╮
│ --configfile          PATH                  [default: tvm2aws.toml]         │
│ --verbose     -v      INTEGER RANGE [x<=5]  [default: 2]                    │
│ --help                                      Show this message and exit.     │
╰─────────────────────────────────────────────────────────────────────────────╯

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tenable_aws_sechub-2.1.1.tar.gz (11.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tenable_aws_sechub-2.1.1-py3-none-any.whl (9.2 kB view details)

Uploaded Python 3

File details

Details for the file tenable_aws_sechub-2.1.1.tar.gz.

File metadata

  • Download URL: tenable_aws_sechub-2.1.1.tar.gz
  • Upload date:
  • Size: 11.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.8.20

File hashes

Hashes for tenable_aws_sechub-2.1.1.tar.gz
Algorithm Hash digest
SHA256 aea3c17cc0c5f7de794e98fdc5dd9ffe2a48e3e47aba71d2f48107e93940f54a
MD5 8e5938ea595f680db43c37d3b93dabc7
BLAKE2b-256 8c9bfe048d42749c8b3c957c49b05d58bc91fb5233cf23348e8a4901a3e730cc

See more details on using hashes here.

File details

Details for the file tenable_aws_sechub-2.1.1-py3-none-any.whl.

File metadata

File hashes

Hashes for tenable_aws_sechub-2.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 3439ab2bada6ba68fd82871c042b5a59bb0c9284990ecc1b13fdbaf090a6f47d
MD5 084d6b059033f6e73e6e7241ea6144f0
BLAKE2b-256 83992baac3e5d8783f252e6e70a8a7330d8c9b85211751307980a5f80ad67f95

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page