Connect APVISO with AWS Security Hub
Import APVISO pentest findings into AWS Security Hub. Centralize vulnerability data with native AWS security tools and compliance frameworks.
Why connect APVISO with AWS Security Hub?
Centralized AWS Security View
View APVISO pentest findings alongside GuardDuty, Inspector, and other AWS security tool results in a single Security Hub dashboard.
ASFF-Native Findings
APVISO maps findings to AWS Security Finding Format (ASFF), ensuring full compatibility with Security Hub's aggregation, filtering, and automation features.
Compliance Framework Mapping
APVISO findings are mapped to relevant compliance controls (CIS, PCI DSS, NIST) so they appear in Security Hub's compliance dashboards.
Automated Response
Use Security Hub's integration with EventBridge and Lambda to automate responses to APVISO findings — for example, blocking a vulnerable endpoint at the WAF level.
Setup Guide
Enable AWS Security Hub
Ensure AWS Security Hub is enabled in your AWS account and the regions where your resources are deployed.
Register APVISO as a Finding Provider
In Security Hub, accept APVISO as a third-party finding provider. This allows APVISO to send findings in ASFF format to your Security Hub account.
Configure IAM Permissions
Create an IAM role with BatchImportFindings permissions for APVISO. Provide the role ARN and external ID in the APVISO integrations settings.
Map Targets to AWS Resources
Optionally link APVISO targets to AWS resource ARNs so findings are associated with specific AWS resources in Security Hub.
Features
- ASFF-formatted finding import into Security Hub
- Severity mapping to Security Hub's normalized severity model
- Compliance control mapping for CIS, PCI DSS, and NIST frameworks
- Resource ARN association for AWS-hosted targets
- Automatic finding updates when vulnerabilities are retested
- EventBridge integration for automated response workflows
- Multi-region support for global AWS deployments
How APVISO Will Integrate with AWS Security Hub
The planned APVISO AWS Security Hub integration will position APVISO findings alongside your entire AWS security stack. By importing pentest results in AWS Security Finding Format (ASFF), your security team manages APVISO vulnerabilities with the same tools and workflows they use for GuardDuty detections, Inspector assessments, and Macie sensitive data discoveries.
AWS Security Finding Format (ASFF)
Security Hub normalizes findings from dozens of AWS and third-party tools into ASFF, a standardized JSON format. APVISO will map each vulnerability to an ASFF finding with:
- AwsAccountId: The AWS account hosting the vulnerable resource
- ProductArn: APVISO's registered product ARN in Security Hub
- GeneratorId: The APVISO finding ID for traceability
- Severity: Normalized to Security Hub's 0-100 scale with a label (CRITICAL, HIGH, MEDIUM, LOW)
- Types: The vulnerability classification using Security Hub's finding type taxonomy (e.g., Software and Configuration Checks/Vulnerabilities/CVE)
- Resources: The AWS resource ARN if the target is mapped to an AWS resource
- Remediation: A URL pointing to the full finding in APVISO with remediation guidance
This ASFF mapping means APVISO findings are fully searchable, filterable, and actionable within Security Hub — no special handling required.
Compliance Framework Mapping
Security Hub includes compliance standards like CIS AWS Foundations, PCI DSS, and NIST 800-53. APVISO findings will be mapped to relevant compliance controls where applicable. For example, an SQL injection finding maps to PCI DSS Requirement 6.5.1 (Injection Flaws), and a weak TLS configuration maps to NIST SC-8 (Transmission Confidentiality and Integrity).
This mapping provides compliance teams with automated evidence that penetration testing is being performed and that findings are tracked against specific controls. Security Hub's compliance dashboard shows the percentage of controls that are passing, giving an immediate view of whether APVISO findings are impacting compliance posture.
Automated Response with EventBridge
One of the most powerful patterns in the AWS security ecosystem is automated response via EventBridge. When APVISO imports a Critical finding into Security Hub, EventBridge can trigger downstream actions:
- WAF Rule Update: A Lambda function adds a rate-limiting rule or blocks the affected endpoint pattern at the AWS WAF level while the vulnerability is being fixed
- SNS Notification: Send the finding to an SNS topic that fans out to multiple subscribers — email distribution lists, ticketing systems, or custom processors
- Step Functions Workflow: Initiate a multi-step remediation workflow that creates a Jira ticket, notifies the on-call engineer via PagerDuty, and schedules a retest
- Security Hub Custom Action: Create manual response options that analysts can trigger from the Security Hub console
This automated response capability means organizations can enforce consistent, rapid responses to critical vulnerabilities without relying on manual intervention.
Multi-Account and Multi-Region Architecture
Organizations using AWS Organizations with a delegated Security Hub administrator can aggregate APVISO findings from scans across multiple accounts and regions into a central administrator account. This is particularly valuable for large enterprises where different teams manage different AWS accounts but security leadership needs a consolidated view.
APVISO's target-to-resource mapping lets you associate each scanned domain with the AWS account and region where it is hosted. Findings are imported into the correct regional Security Hub, then aggregated to the administrator account for centralized management.
Finding Lifecycle Management
APVISO manages the full lifecycle of findings in Security Hub. When a vulnerability is first discovered, a new finding is created with a NEW workflow status. If a retest confirms the vulnerability still exists, the finding is updated with the latest scan timestamp. When a retest confirms the fix, APVISO updates the finding's workflow status to RESOLVED and sets the record state to ARCHIVED.
This lifecycle management keeps Security Hub's finding list clean and current. Analysts see only active vulnerabilities, while resolved findings are preserved for audit and trend analysis. Security Hub's insights can track metrics like average finding age and resolution rate over time.
Integration with Existing AWS Security Workflows
For organizations that have already built workflows around Security Hub — custom integrations, automated remediation, compliance reporting — APVISO findings plug in seamlessly. There is no need to build separate pipelines for pentest results. The same dashboards, alerts, and automations that handle GuardDuty and Inspector findings will automatically include APVISO vulnerabilities, providing a truly unified security posture view.
Frequently Asked Questions
When will the AWS Security Hub integration be available?▾
The AWS Security Hub integration is on our roadmap. Sign up for the waitlist in APVISO Settings > Integrations to be notified when it launches.
Which AWS regions are supported?▾
APVISO will support all AWS regions where Security Hub is available. Findings are sent to the region(s) you configure in the integration settings.
Can I use Security Hub automation rules with APVISO findings?▾
Yes. APVISO findings imported into Security Hub can be acted on by Security Hub automation rules and by EventBridge rules — enabling workflows like auto-suppressing informational findings or triggering Lambda functions for remediation.
How does APVISO map severity to Security Hub's model?▾
APVISO maps its severity ratings to Security Hub's normalized severity scores: Critical (90-100), High (70-89), Medium (40-69), and Low (1-39). This ensures consistent sorting and filtering alongside findings from other tools.
Related Integrations
Related Terms
AWS Security Hub integration coming soon
Join the waitlist to be notified when the AWS Security Hub integration is available.
Join Waitlist