-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Enhancement]: Security Hub - Support enabling and disabling controls in all standards #33406
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
Is there any progress in this? |
The AWS documentation is actually a bit unclear here. The user guide documents how to disable a particular control across all standards in one account. But the API example doesn't do this directly, instead it describes that one needs to list all standards a control is in, and then does a batch update to disable the control in each standard. The API documentation confirms that both the The |
Yes that makes sense. I had to give the following to disable the control. aws securityhub batch-update-standards-control-associations \
--standards-control-association-updates '[{
"SecurityControlId": "IAM.16",
"StandardsArn": "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0",
"AssociationStatus": "DISABLED",
"UpdatedReason": "We handle password policies within Okta"
}]' so a more accurate resource would be resource "aws_securityhub_security_control" "default" {
security_control_id = "IAM.16"
standards_arn = "arn:aws:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0"
association_status = "DISABLED"
updated_reason = "We handle password policies within Okta"
} |
Maybe it could also be useful to have a data source for finding a specific standard. |
Warning This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them. Ongoing conversations amongst community members are welcome, however, the issue will be locked after 30 days. Moving conversations to another venue, such as the AWS Provider forum, is recommended. If you have additional concerns, please open a new issue, referencing this one where needed. |
Sweet, thank you very much |
This functionality has been released in v5.70.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Description
When using unified security controls, AWS provides a method to enable or disable a control across all standards.
Doing this in Terraform now requires disabling the control in each individual standard, e.g.:
as opposed to just once (e.g.
"IAM.14"
).This functionality would likely be implemented by adding a new
aws_securityhub_standards_control
resource, but would be closely related to theaws_securityhub_standards_control
resourceAffected Resource(s) and/or Data Source(s)
Potential Terraform Configuration
References
BatchUpdateStandardsControlAssociations
| AWS Security Hub API ReferenceListStandardsControlAssociations
| AWS Security Hub API ReferenceBatchGetStandardsControlAssociations
| AWS Security Hub API ReferenceWould you like to implement a fix?
No
EDIT: Removed superfluous details
The text was updated successfully, but these errors were encountered: