autobotAI

Security Hub (OCSF) Integration

Note: This page is the official configuration guide for the autobotAI Security Hub (OCSF) integration listed in the AWS Security Hub partner console.

Overview

AWS Security Hub provides a centralized view of your security posture across your AWS environment. This integration consumes Security Hub (OCSF) findings in OCSF 1.6 format via Amazon EventBridge, enabling autobotAI to power automated security response workflows and compliance monitoring.

Security Hub CSPM continues to use the AWS Security Finding Format (ASFF) and is treated as a separate integration from the OCSF-based stream described here.

By using the listener integration with Security Hub (OCSF), you can:

  • Receive real-time security findings from AWS Security Hub
  • Create automated response workflows for security incidents
  • Integrate Security Hub findings with your existing automation pipelines
  • Monitor compliance and security posture in a unified dashboard

Security Hub (OCSF) vs Security Hub CSPM (ASFF)

It is important to distinguish between Security Hub CSPM (ASFF) (Cloud Security Posture Management) and the event-driven Security Hub (OCSF) integration via EventBridge:

  • Security Hub (OCSF): Delivers security findings from AWS services (GuardDuty, Inspector, etc.) in the Open Cybersecurity Schema Framework (OCSF) format. It is event-driven and provides real-time alerts.
  • Security Hub CSPM (ASFF): Focuses on compliance standards (CIS, PCI DSS) using the AWS Security Finding Format (ASFF). It typically performs periodic scans rather than real-time event streaming.

Key differences include:

  1. Real-time Response: Security Hub CSPM (ASFF) typically performs periodic compliance scans (e.g., every 12-24 hours) to evaluate resources against standards like CIS or PCI DSS. In contrast, the Security Hub (OCSF) EventBridge integration allows autobotAI to receive and act upon findings the instant they are generated, significantly reducing your Mean Time to Remediate (MTTR).
  2. Immediate Threat Detection: While Security Hub CSPM (ASFF) focuses on static configurations, the Security Hub (OCSF) finding stream aggregates active threat intelligence from services like GuardDuty, Amazon Inspector, and IAM Access Analyzer. This ensures you can automate responses to malicious activity as it happens.
  3. Efficiency and Cost: Polling for updates in Security Hub CSPM (ASFF) can be resource-intensive and slow. The event-driven model used here is more efficient, as AWS "pushes" only the relevant findings to autobotAI exactly when they occur.
  4. Operational Agility: This integration enables "Self-Healing" infrastructure. By listening to Security Hub (OCSF), autobotAI can automatically revert unauthorized security group changes or quarantine compromised instances without waiting for the next scheduled CSPM scan.

Note: For existing Security Hub CSPM (ASFF) integrations, continue to use the Security Hub Findings - Imported detail type. The Security Hub Findings Imported V2 detail type is used for the new Security Hub (OCSF) integration described on this page.

Value Add for Security Hub (OCSF) Customers

When you connect Security Hub (OCSF) to autobotAI, findings are not only collected but also prioritized and automatically remediated through bots and workflows. autobotAI can, for example:

  • Quarantine compromised EC2 instances when critical findings are detected
  • Automatically revert risky security group changes
  • Disable exposed IAM credentials
  • Open incident tickets in your ITSM when high-severity findings are detected
  • Trigger custom remediation playbooks based on finding type and severity

This gives customers a real-time, automated response layer on top of AWS Security Hub, reducing Mean Time to Detect (MTTD) and Mean Time to Remediate (MTTR).

Prerequisites

Before setting up the AWS Security Hub integration, ensure you have:

  1. Active AWS Account

    • An active AWS account with Security Hub enabled in your region
    • Security Hub already configured and collecting findings
  2. autobotAI Account

    • A registered autobotAI account
    • Admin or Editor permissions to create listeners
  3. Security Hub Enabled

    • Security Hub enabled in your AWS account
    • Findings being collected and published

Architecture

The integration uses AWS EventBridge to securely forward Security Hub findings to autobotAI:

AWS Security Hub → EventBridge Rule → API Destination → autobotAI Listener

Components:

  • EventBridge Rule: Filters and forwards Security Hub findings
  • API Destination: Secure endpoint for receiving findings
  • Connection: API key authentication between AWS and autobotAI
  • autobotAI Listener: Receives and processes incoming findings

Delegated Admin and Home Region

If you are using a Security Hub delegated administrator account and aggregating findings into a home region, deploy this EventBridge rule only in the delegated admin's home region. All aggregated Security Hub (OCSF) findings flow to that region, ensuring autobotAI receives findings from every account in your AWS Organization without per-account or per-region rules.

Setup Instructions

Step 1: Create a Security Hub Listener in autobotAI

  1. Navigate to Listeners

    • Go to the autobotAI dashboard
    • Click on "Bot Building Blocks" → "Listeners"
  2. Create New Listener

    • Click on "+ New" to create a new listener
  3. Configure Listener Details

    • Name: Give your listener a descriptive name (e.g., "Security Hub (OCSF) Findings")
    • Description: Add a brief description for reference
    • Authentication Method: Select Secret Key in Headers
    • Click on "Next"
  4. Generate Authentication

    • autobotAI will automatically generate a unique Listener URL and Secret Key
    • Click "Generate" if needed
  5. Important: Save Your Credentials

    • Copy both the Listener URL and Secret Key
    • Store these securely - they will be needed for AWS configuration

Step 2: Deploy CloudFormation Template

Follow these steps to deploy the integration using the provided CloudFormation template.

  1. Download the Template

  2. Open CloudFormation Console

    • Go to the AWS CloudFormation console in your preferred region.
    • Click "Create stack" and select "With new resources (standard)".
  3. Specify template source

    • Select "Upload a template file".
    • Click "Choose file" and select the autobotAI-Security-Hub-EventBridge.yml file you downloaded in step 1.
    • Click "Next".
  4. Provide stack name

    • Stack name: autobotAI-Security-Hub-EventBridge
  5. Configure stack parameters

    • APIEndPoint: Your autobotAI listener URL (from Step 1)
    • APIKeyName: x-secret-key (default)
    • APIKeyValue: Your autobotAI secret key (from Step 1)
  6. Configure capabilities

    • Click "Next"
    • Enable the required capabilities:
      • IAM Permissions: AWS Auto Scaling creates IAM resources
      • CAPABILITY_IAM (if it prompts)
  7. Configure stack options (optional)

    • Review advanced settings if needed
    • Keep defaults for most scenarios
  8. Create and monitor

    • Check the Capabilities checkbox at the bottom and click on "Next"
    • Click on "Submit"
    • Wait for deployment (typically 1-3 minutes)
    • Monitor progress in the "Stack operations" tab
  9. Verify successful deployment

    • Check that stack status shows "CREATE_COMPLETE"
    • Review the created resources in the "Resources" tab
    • Note the ARNs for troubleshooting if needed

Optional: Manual EventBridge Rule Creation (Console)

If you prefer not to use CloudFormation, you can create the EventBridge rule manually:

  1. Go to the Amazon EventBridge console and choose Rules → Create rule.

  2. Set a rule name, for example autobotAI-Security-Hub-Findings.

  3. For Event source, choose AWS events or EventBridge partner events.

  4. For Event pattern, select Event pattern form and configure:

    • Event source: AWS services
    • Service name: Security Hub
    • Event type: Security Hub Findings Imported V2
  5. Alternatively, use Custom pattern (JSON editor) with:

    json
    { "source": ["aws.securityhub"], "detail-type": ["Security Hub Findings Imported V2"] }
  6. For Target, select API destination and choose the destination created for your autobotAI listener (or create a new API destination using the listener URL and secret key provided in Step 1).

  7. Configure the API destination (if creating new):

    • Name: autobotAI-Listener
    • API destination endpoint: Your autobotAI listener URL
    • HTTP method: POST
    • Connection: Create new connection with API key authorization using your autobotAI secret key
  8. Save the rule and ensure its state is ENABLED.

For detailed steps on creating API destinations, see the Amazon EventBridge API Destinations documentation.

Step 3: Verify Integration

  1. Check EventBridge Rule

    • Go to AWS EventBridge console
    • Find the rule named autobotAI-Security-Hub-Findings
    • Verify it's enabled and targeting your API destination
  2. Test Security Hub Findings

    • Trigger a Security Hub finding by making a change to your AWS resources
    • Wait a few minutes for the finding to appear
  3. Verify in autobotAI

    • Go to your listener in autobotAI
    • Click "Test" to view recent events
    • You should see Security Hub finding data being received

CloudFormation Template

The integration uses the following CloudFormation template:

Template URL:

https://autobot-ai.s3.amazonaws.com/autobotAI-Security-Hub-EventBridge.yml

Template Components:

EventBridge API Destination

Forwards Security Hub findings to your autobotAI listener endpoint

Properties:

  • Name: autobotAI-security-hub-listener-webhook
  • Invocation Endpoint: Your listener URL
  • HttpMethod: POST
  • Rate Limit: 300 invocations per second
  • Authorization: API key authentication

EventBridge Connection

Establishes secure connection to your autobotAI listener

Properties:

  • Name: autobotAI-security-hub-listener-connection
  • Authorization Type: API_KEY
  • API Key Name: x-secret-key
  • API Key Value: Your listener secret

IAM Roles and Policies

Grants EventBridge permission to invoke your API destination

Resources:

  • IAM Role: autobotAI_EventBridge_Invoke_Api_Destination
  • Managed Policy: autobotAI_EventBridge_Invoke_Api_Destination_Policy

EventBridge Rule

Filters and forwards Security Hub findings

Event Pattern:

  • Source: aws.securityhub
  • Detail Type: Security Hub Findings Imported V2
  • AWS Account ID: Your account ID
  • State: Enabled

Security Considerations

Authentication

  • API Key Authentication: Uses header-based authentication
  • Secret Key Protection: Treat your secret key as sensitive data
  • HTTPS Only: All communication uses HTTPS for encryption

Data Privacy

  • Findings remain in your AWS account until forwarded
  • No data is stored on autobotAI servers
  • You maintain full control over your Security Hub data

Access Control

  • Only your AWS account can configure the EventBridge rule
  • The CloudFormation stack requires appropriate IAM permissions
  • Review IAM roles to ensure least privilege access

Troubleshooting

Stack Creation Fails

Problem: CloudFormation stack fails to create

Solutions:

  1. IAM Permissions: Ensure you have permission to create EventBridge resources
  2. Region: Verify Security Hub is enabled in the same region as deployment
  3. Limit Exceeded: Check AWS service quotas for EventBridge resources
  4. Network: Ensure outbound HTTPS connectivity to autobotAI

No Findings Received

Problem: Security Hub findings not appearing in autobotAI

Troubleshooting Steps:

  1. Check EventBridge Rule Status

    • Go to AWS EventBridge console
    • Verify rule is enabled and rule state is "ENABLED"
    • Check rule's event pattern matches your findings
  2. Verify API Destination

    • Check that the API destination exists and is healthy
    • Test the endpoint manually using curl or Postman
    • Verify the URL and secret key are correct
  3. Check Listener Status

    • Confirm your listener in autobotAI is active
    • Click "Test" to view listener activity
    • Check for any authentication errors
  4. Review CloudWatch Logs

    • Check EventBridge rule delivery logs
    • Look for API destination invocation failures
    • Verify Lambda execution logs (if applicable)

Security Hub Findings Not Matching

Problem: EventBridge rule not matching your Security Hub findings

Solutions:

  1. Verify Findings

    • Check actual finding structure in Security Hub console
    • Confirm source and detail type values
  2. Adjust Event Pattern

    • Modify the CloudFormation template event pattern if needed
    • Use CloudWatch Logs Insights to analyze matching findings
  3. Check Finding State

    • Security Hub findings must be imported to trigger the rule
    • Ensure findings are being processed through Security Hub workflows

Best Practices

Security Hub Findings Management

  1. Enable Necessary Standards

    • Enable AWS Security Best Practices standard
    • Configure for your organization's compliance requirements
  2. Configure Automated Remediation

    • Set up AWS Config rules for continuous compliance
    • Configure automated response actions for critical findings
  3. Regular Review Schedule

    • Review findings weekly to identify trends
    • Prioritize findings based on severity and business impact

autobotAI Workflow Optimization

  1. Create Dedicated Bots

    • Build specific bots for common Security Hub finding types
    • Automate responses for frequent finding patterns
  2. Configure Alerting

    • Set up notification rules for high-severity findings
    • Integrate with incident management systems
  3. Monitor Performance

    • Track listener response times
    • Optimize bot workflows for efficient processing

Cost Management

  1. EventBridge Pricing

    • Monitor EventBridge rule executions
    • Set budget alerts for API destination costs
  2. Security Hub Costs

    • Review Security Hub standard configurations
    • Optimize for only relevant compliance requirements
  3. autobotAI Usage

    • Monitor workflow execution costs
    • Review listener event volume for cost optimization

Supported Security Hub Findings

The integration supports Security Hub (OCSF) findings with the following event pattern:

Source: aws.securityhub

Detail Type: Security Hub Findings Imported V2

Findings are delivered in Open Cybersecurity Schema Framework (OCSF) 1.6 format, with AWS Security Hub-specific resource attributes preserved for compatibility and enrichment.

Finding Fields:

  • Finding ID
  • Title
  • Description
  • Severity
  • Confidence
  • Sources
  • Resources
  • Product ARN
  • Types
  • First Observed At
  • Last Observed At
  • Created At
  • Updated At
  • Classification
  • User Action
  • Compliance
  • Related Findings
  • Record State
  • Verification State
  • Workflow

The payload structure follows the OCSF 1.6 Security Hub finding schema; fields such as severity, resources, product ARN, and timestamps are mapped according to the OCSF standard, with AWS-specific resource attributes preserved for enrichment.

Next Steps

Create Security Response Workflows

  1. Build Bots for Findings

    • Create bots to analyze incoming Security Hub findings
    • Implement automated remediation actions
  2. Set Up Approval Workflows

    • Configure approval chains for critical findings
    • Implement escalation policies for unresolved issues
  3. Integration with Other Tools

    • Connect to incident management systems
    • Integrate with threat intelligence platforms

Monitor and Optimize

  1. Setup Dashboards

    • Create visualizations for Security Hub findings
    • Build alerting and reporting dashboards
  2. Regular Audits

    • Review Security Hub findings weekly
    • Analyze trends and identify patterns
    • Continuously improve security posture
  3. Documentation

    • Maintain detailed records of security responses
    • Document successful remediation strategies
    • Share lessons learned with security team

Support and Resources

AWS Documentation

autobotAI Resources

Additional Help

  • Contact autobotAI support for integration issues
  • Review CloudFormation template documentation
  • Check AWS CloudFormation service limits

Migration from Existing Integrations

If you have existing Security Hub integration patterns, consider migrating to this architecture for:

  1. Centralized Management: All Security Hub findings processed through autobotAI
  2. Automated Workflows: Built-in bot creation from findings
  3. Unified Dashboard: Single view of all security events
  4. Improved Security: API key authentication and encrypted communication

Migration Steps:

  1. Create new listener in autobotAI
  2. Deploy CloudFormation stack
  3. Update security policies to reference new listener URL
  4. Decommission old integration endpoints
  5. Test end-to-end functionality

Need Help? If you encounter any issues during setup, contact autobotAI support with:

  • CloudFormation stack status
  • Security Hub finding samples
  • EventBridge rule logs