paint-brush
Setting Up AWS SecurityHub With Terraform in a Minuteby@mantux
4,210 reads
4,210 reads

Setting Up AWS SecurityHub With Terraform in a Minute

by Leandro Mantovani2mJanuary 14th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The first section of the code enables SecurityHub automatically for all new accounts in the Organization. This lets us keep our environment fully compliant, and centralize all findings in security account. The second resource enables the CIS benchmark. This is very useful since it’ll give you a lot of checks that you can use to size the level of compliance resources in your accounts. The first time you enabled it, you need to add existing accounts in this way. For new accounts, you are covered with auto_enable flag.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Setting Up AWS SecurityHub With Terraform in a Minute
Leandro Mantovani HackerNoon profile picture
Leandro Mantovani

Leandro Mantovani

@mantux

Cloud Security Engineer | Researcher | Blogger | Soccer player

About @mantux
LEARN MORE ABOUT @MANTUX'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Leandro Mantovani HackerNoon profile picture
Leandro Mantovani@mantux
Cloud Security Engineer | Researcher | Blogger | Soccer player

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite