chore(Security Hub): add status extended to Security Hub (#1921)

This commit is contained in:
Sergio Garcia
2023-02-21 15:11:43 +01:00
committed by GitHub
parent 813f3e7d42
commit ce3ef0550f
4 changed files with 4 additions and 4 deletions

View File

@@ -31,7 +31,7 @@ def fill_json_asff(finding_output, audit_info, finding):
) = finding_output.CreatedAt = timestamp_utc.strftime("%Y-%m-%dT%H:%M:%SZ") ) = finding_output.CreatedAt = timestamp_utc.strftime("%Y-%m-%dT%H:%M:%SZ")
finding_output.Severity = Severity(Label=finding.check_metadata.Severity.upper()) finding_output.Severity = Severity(Label=finding.check_metadata.Severity.upper())
finding_output.Title = finding.check_metadata.CheckTitle finding_output.Title = finding.check_metadata.CheckTitle
finding_output.Description = finding.check_metadata.Description finding_output.Description = finding.status_extended
finding_output.Resources = [ finding_output.Resources = [
Resource( Resource(
Id=finding.resource_arn, Id=finding.resource_arn,

View File

@@ -9,7 +9,7 @@
"SubServiceName": "service_endpoint", "SubServiceName": "service_endpoint",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id", "ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium", "Severity": "medium",
"ResourceType": "AwsEc2Vpc", "ResourceType": "AwsEc2VpcEndpointService",
"Description": "Find trust boundaries in VPC endpoint services allowlisted principles.", "Description": "Find trust boundaries in VPC endpoint services allowlisted principles.",
"Risk": "Account VPC could be linked to other accounts.", "Risk": "Account VPC could be linked to other accounts.",
"RelatedUrl": "", "RelatedUrl": "",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "route_table", "SubServiceName": "route_table",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id", "ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium", "Severity": "medium",
"ResourceType": "AwsEc2Vpc", "ResourceType": "AwsEc2VpcPeeringConnection",
"Description": "Ensure routing tables for VPC peering are least access.", "Description": "Ensure routing tables for VPC peering are least access.",
"Risk": "Being highly selective in peering routing tables is a very effective way of minimizing the impact of breach as resources outside of these routes are inaccessible to the peered VPC.", "Risk": "Being highly selective in peering routing tables is a very effective way of minimizing the impact of breach as resources outside of these routes are inaccessible to the peered VPC.",
"RelatedUrl": "", "RelatedUrl": "",

View File

@@ -291,7 +291,7 @@ class Test_Outputs:
) = expected.CreatedAt = timestamp_utc.strftime("%Y-%m-%dT%H:%M:%SZ") ) = expected.CreatedAt = timestamp_utc.strftime("%Y-%m-%dT%H:%M:%SZ")
expected.Severity = Severity(Label=finding.check_metadata.Severity.upper()) expected.Severity = Severity(Label=finding.check_metadata.Severity.upper())
expected.Title = finding.check_metadata.CheckTitle expected.Title = finding.check_metadata.CheckTitle
expected.Description = finding.check_metadata.Description expected.Description = finding.status_extended
expected.Resources = [ expected.Resources = [
Resource( Resource(
Id="test-arn", Id="test-arn",