You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
This feature is related to a problem.
We are currently utilizing the AWS Landing Zone Accelerator (LZA) alongside AWS Security Hub. However, the resources created and managed by the LZA pipeline are adversely affecting our Security Score. To mitigate this issue, our team has implemented several Custom Config Rules to explicitly exclude all LZA-created resources from evaluation. We are seeking a solution that addresses this challenge without the need to establish multiple custom configuration rules to maintain or improve our security score.
Describe the feature you'd like
I would like an option for rules to ignore resources based on regex or LZA resources.
Additional context
Here are some examples of The Custom Config Rules we had to create:
Rule Name: ECRLifecyclePolicyEnforcement
Description: Ensures that all ECR repositories have lifecycle policies attached, excluding LZA-created repositories matching the pattern cdk-accel-container-assets-*.
Rule Replaced: ECR.3
Name: S3BucketLoggingEnabledExclusion
description: Ensures that all S3 buckets have logging enabled, excluding LZA-created buckets matching the pattern aws-accelerator-s3-access-logs-*.
Rule Replaced: S3.9
The text was updated successfully, but these errors were encountered:
Another example finding is Lambda.3 which expects functions to run in a VPC. Conveniently excluding LZA resources from findings which they are intentionally in violation of using a default configuration would indeed eliminate a large amount of security noise. It would also provide a convenient explanation to cyber security folks who need to provide approval for such exceptions.
Thank you for reaching out. We have an open item in our backlog for this feature request, because as you indicated, this impacts the security score in your environment if you're using SecurityHub as your SIEM. I have added this issue to the aforementioned issue to get more traction. I will keep this issue open and keep you up to date once this is supported for a future release. Please let me know if you have any other questions or concerns in the meantime.
Is your feature request related to a problem? Please describe.
This feature is related to a problem.
We are currently utilizing the AWS Landing Zone Accelerator (LZA) alongside AWS Security Hub. However, the resources created and managed by the LZA pipeline are adversely affecting our Security Score. To mitigate this issue, our team has implemented several Custom Config Rules to explicitly exclude all LZA-created resources from evaluation. We are seeking a solution that addresses this challenge without the need to establish multiple custom configuration rules to maintain or improve our security score.
Describe the feature you'd like
I would like an option for rules to ignore resources based on regex or LZA resources.
Additional context
Here are some examples of The Custom Config Rules we had to create:
Rule Name: ECRLifecyclePolicyEnforcement
Description: Ensures that all ECR repositories have lifecycle policies attached, excluding LZA-created repositories matching the pattern cdk-accel-container-assets-*.
Rule Replaced: ECR.3
Name: S3BucketLoggingEnabledExclusion
description: Ensures that all S3 buckets have logging enabled, excluding LZA-created buckets matching the pattern aws-accelerator-s3-access-logs-*.
Rule Replaced: S3.9
The text was updated successfully, but these errors were encountered: