AWS SecurityHub Integration
Connect QuantAssure to AWS SecurityHub to aggregate security findings from your AWS environment.
What It Collects
- SecurityHub Findings — All findings from AWS
SecurityHub, including:
- GuardDuty threat detection
- Inspector vulnerability assessments
- Config compliance findings
- Other integrated AWS security services
Prerequisites
- An AWS account with SecurityHub enabled
- IAM credentials (access key and secret) with permissions to read SecurityHub findings
-
Required IAM permissions:
securityhub:GetFindings securityhub:BatchGetFindings
Setup Steps
1. Enable AWS SecurityHub
If not already enabled:
- Open the AWS Console
- Navigate to SecurityHub
- Click "Go to Security Hub" and enable it
- Enable any security standards you want to check against (e.g., AWS Foundational Security Best Practices)
2. Create IAM Credentials
- Open the IAM Console
- Create a new IAM user or use an existing one
-
Attach a policy with SecurityHub read permissions:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "securityhub:GetFindings", "securityhub:BatchGetFindings" ], "Resource": "*" } ] } - Create an access key for the user
- Save the Access Key ID and Secret Access Key — you'll need both
3. Configure in QuantAssure
- Create or edit a System in QuantAssure
- In the Data Sources section, enable AWS SecurityHub
-
Enter your AWS region (e.g.,
us-east-1,ap-southeast-2) - Enter your Access Key ID
- Enter your Secret Access Key
- Save your system configuration
4. Run Your First Scan
Click "Run Scan" to collect findings from SecurityHub.
What to Expect
After your first scan:
- Findings: All active SecurityHub findings
- Findings include severity (mapped from AWS severity labels), affected resources, and remediation guidance
- Findings from all enabled integrations (GuardDuty, Inspector, Config, etc.) are aggregated
Troubleshooting
"Access Denied" error
- Verify your IAM credentials are correct
-
Check that the IAM user has
securityhub:GetFindingspermission - Ensure the credentials have access to the specified region
No findings appearing
- Verify SecurityHub is enabled in your AWS account
- Check that you have security standards enabled (they generate findings)
- It can take time for SecurityHub to generate initial findings
Partial findings
- Each AWS region has its own SecurityHub instance
- Configure multiple systems if you need findings from multiple regions