AWS Security Hub
Last updated
Last updated
To integrate AWS Security Hub into the Complico system, navigate to the Available Integrations page and select the Security Hub icon, as indicated by the arrow below.
In the "Add Integration" window displayed below, it is necessary to input the AWS Access Key and Secret Key.
Before obtaining these keys, it is imperative to verify that our Security Hub users within the AWS system possess Read-Only Permissions.
These permissions are crucial for enabling the Complico system to collect information from the Integration App.
Complico specifically requires Read-Only access, utilizing the retrieved data solely for compliance purposes, without initiating any alterations, deletions, or additions to the Security Hub system.
Displayed below is the AWS Console home page. Proceed by clicking on the IAM (Identity and Access Management) button, as indicated by the arrow below, to access User Groups and Permissions.
In case the IAM button is not visible on the main Console page, utilize the site's search bar and enter "IAM" to locate it.
In the User Groups tab shown here, we will initiate the process by clicking on the "Create Group" button, as indicated by the arrow below.
Subsequently, provide the created group with Read-Only Permissions for Security Hub, ensuring that any user added to the group automatically inherits these permissions.
On the Create Group page, after naming the group and adding users to it, choose the Security Hub Read-Only Access permission policy, as highlighted by the arrow below.
Following the selection of the appropriate permission, click on the "Create Group" button, circled below.
Ensuring that our users possess the Read-Only permissions for Security Hub, proceed by clicking on the Admin name to reveal the drop-down options menu, as indicated by the arrow below.
From this menu, highlighted in the circle below, select "Security Credentials."
Within the 'Access Keys' section, select the 'Create Access Key' button, as denoted by the arrow below.
Return to Complico's 'Add Integration' window and input a custom integration name along with the keys you have created.
Now, choose the appropriate Vendor that offers the Security Hub service, and if there isn't a suitable Vendor available, you can also create a Vendor directly in the 'Add Integration' window.
Click on the 'Create Vendor' button, as indicated by the arrow below.
Once all mandatory fields are completed, proceed by clicking on the 'Add Integration' button, as indicated by the arrow below.
On the Installed Integration page, you can review the installed integrations.
In the image below, you can see an example of the Security Hub Integration that has been installed.
To return to the
To return to the