Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS Security Hub : Security standard : AWS Foundational Security Best Practices v1.0.0 -- reports some issues with this solution #290

Open
gnom7 opened this issue May 15, 2024 · 0 comments
Labels
enhancement New feature or request

Comments

@gnom7
Copy link

gnom7 commented May 15, 2024

Describe the feature

Official AWS Security Hub : Security standard : AWS Foundational Security Best Practices v1.0.0 is reporting that this solution violates some rules and thus our overall security score is getting worse.

Some of them are:

  • CloudFront distributions should have WAF enabled. This control checks to see if Amazon CloudFront distributions are associated with either WAF or WAFv2 web ACLs. The control fails if a CloudFront distribution is not associated with a web ACL
  • Checks whether the security groups in use do not allow unrestricted incoming TCP traffic to the specified ports. The rule is NON_COMPLIANT if a security group allows inbound traffic from 0.0.0.0/0 or ::/0 to the specified ports.
  • Checks whether the default security group for VPC is closed.

I'd expect decent integration and syncing between AWS services/solutions. Could you please address issues reported by AWS Security Hub related to this solution?

Use Case

AWS Security Hub is enabled in my AWS account and configured with AWS Foundational Security Best Practices v1.0.0 security standard

Proposed Solution

No response

Other Information

No response

Solution version used

v2.1.2

@JoeShi JoeShi added the enhancement New feature or request label Dec 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants