Skip to content
SEC01

SEC01-BP04 - Stay up to date with security threats and recommendations

One-Click Remediation

Deploy CloudFormation stacks to implement this best practice with a single click.

Enable Amazon GuardDuty
Enable GuardDuty threat detection in the current region
Launch Stack
Enable Amazon Inspector
Enable Inspector for automated vulnerability scanning
Launch Stack

Stacks deploy to your AWS account. Review parameters before creating. Standard AWS charges apply.

Implementation guidance

The security landscape is constantly evolving, with new threats and vulnerabilities emerging regularly. Staying informed about the latest security threats and recommendations is essential for maintaining a strong security posture and protecting your AWS workloads.

Key steps for implementing this best practice:

  1. Monitor AWS security resources:

    • Subscribe to the AWS Security Bulletin
    • Follow the AWS Security Blog
    • Monitor AWS service health and security announcements
    • Review AWS Trusted Advisor security recommendations
    • Join the AWS Security Notifications mailing list
    • Follow AWS security experts on social media
  2. Implement security information services:

    • Enable AWS Security Hub to aggregate security findings
    • Use Amazon GuardDuty for threat detection
    • Configure AWS Config for configuration monitoring
    • Implement Amazon Inspector for vulnerability assessments
    • Set up Amazon Detective for security investigations
    • Use AWS Trusted Advisor for security best practice checks
  3. Stay informed about industry threats:

    • Subscribe to security advisories and bulletins from trusted sources
    • Follow reputable security blogs and news sources
    • Participate in security communities and forums
    • Join industry-specific security groups
    • Consider threat intelligence services
    • Monitor vulnerability databases like CVE and NVD
  4. Establish a security update process:

    • Assign responsibility for monitoring security updates
    • Define a process for evaluating security threats and recommendations
    • Establish criteria for prioritizing security updates
    • Document procedures for implementing security patches
    • Set up a regular cadence for security reviews
    • Create a communication plan for security updates
  5. Implement continuous security monitoring:

    • Set up automated alerts for security findings
    • Regularly review security dashboards
    • Monitor for unusual activity or patterns
    • Track security metrics and trends
    • Conduct regular security assessments
    • Perform periodic penetration testing
  6. Foster a security-aware culture:

    • Provide regular security training for team members
    • Share relevant security updates with the team
    • Encourage reporting of potential security issues
    • Recognize and reward security-conscious behavior
    • Conduct security awareness campaigns
    • Include security in team meetings and discussions

Implementation examples

Example 1: Setting up AWS security information services

View code
Resources:
  # Enable AWS Security Hub
  SecurityHub:
    Type: 'AWS::SecurityHub::Hub'
    Properties: {}
  
  # Enable Amazon GuardDuty
  GuardDutyDetector:
    Type: 'AWS::GuardDuty::Detector'
    Properties:
      Enable: true
      FindingPublishingFrequency: 'FIFTEEN_MINUTES'
  
  # Enable Amazon Inspector
  InspectorResourceGroup:
    Type: 'AWS::Inspector::ResourceGroup'
    Properties:
      ResourceGroupTags:
        - Key: 'Environment'
          Value: 'Production'
  
  InspectorAssessmentTarget:
    Type: 'AWS::Inspector::AssessmentTarget'
    Properties:
      AssessmentTargetName: 'Production-Assessment-Target'
      ResourceGroupArn: !GetAtt InspectorResourceGroup.Arn
  
  InspectorAssessmentTemplate:
    Type: 'AWS::Inspector::AssessmentTemplate'
    Properties:
      AssessmentTemplateName: 'Production-Assessment-Template'
      AssessmentTargetArn: !Ref InspectorAssessmentTarget
      DurationInSeconds: 3600
      RulesPackageArns:
        - !Sub 'arn:aws:inspector:${AWS::Region}:${AWS::AccountId}:rulespackage/0-gEjTy7T7'
        - !Sub 'arn:aws:inspector:${AWS::Region}:${AWS::AccountId}:rulespackage/0-rExsr2X8'
        - !Sub 'arn:aws:inspector:${AWS::Region}:${AWS::AccountId}:rulespackage/0-PmNV0Tcd'
        - !Sub 'arn:aws:inspector:${AWS::Region}:${AWS::AccountId}:rulespackage/0-xUY8iRqX'

Example 2: Setting up security finding notifications

View code
Resources:
  # SNS Topic for security findings
  SecurityFindingsTopic:
    Type: 'AWS::SNS::Topic'
    Properties:
      TopicName: 'security-findings-topic'
      DisplayName: 'Security Findings'
  
  # Subscription to the SNS topic
  SecurityFindingsSubscription:
    Type: 'AWS::SNS::Subscription'
    Properties:
      TopicArn: !Ref SecurityFindingsTopic
      Protocol: 'email'
      Endpoint: 'security-team@example.com'
  
  # EventBridge rule for GuardDuty findings
  GuardDutyFindingsRule:
    Type: 'AWS::Events::Rule'
    Properties:
      Name: 'guardduty-findings-rule'
      Description: 'Rule to capture GuardDuty findings'
      EventPattern:
        source:
          - 'aws.guardduty'
        detail-type:
          - 'GuardDuty Finding'
        detail:
          severity:
            - 4
            - 4.0
            - 4.1
            - 4.2
            - 4.3
            - 4.4
            - 4.5
            - 4.6
            - 4.7
            - 4.8
            - 4.9
            - 5
            - 5.0
            - 5.1
            - 5.2
            - 5.3
            - 5.4
            - 5.5
            - 5.6
            - 5.7
            - 5.8
            - 5.9
            - 6
            - 6.0
            - 6.1
            - 6.2
            - 6.3
            - 6.4
            - 6.5
            - 6.6
            - 6.7
            - 6.8
            - 6.9
            - 7
            - 7.0
            - 7.1
            - 7.2
            - 7.3
            - 7.4
            - 7.5
            - 7.6
            - 7.7
            - 7.8
            - 7.9
            - 8
            - 8.0
            - 8.1
            - 8.2
            - 8.3
            - 8.4
            - 8.5
            - 8.6
            - 8.7
            - 8.8
            - 8.9
      State: 'ENABLED'
      Targets:
        - Id: 'SecurityFindingsTopic'
          Arn: !Ref SecurityFindingsTopic

Example 3: Security update tracking system

View code
Security Update Tracking Process:

1. Information Sources:
   - AWS Security Bulletin
   - AWS Security Blog
   - CVE Database
   - Vendor security advisories
   - Industry security news

2. Weekly Security Review:
   - Review all security information sources
   - Document new threats and vulnerabilities
   - Assess relevance to our environment
   - Determine priority (Critical, High, Medium, Low)
   - Assign responsibility for remediation

3. Tracking System:
   - Security update ID
   - Description
   - Source
   - Date identified
   - Affected systems
   - Priority
   - Remediation steps
   - Assigned to
   - Status
   - Completion date
   - Verification method
   - Notes

4. Reporting:
   - Weekly security update summary
   - Monthly security metrics
   - Quarterly security posture review

AWS services to consider

AWS Security Hub

Provides a comprehensive view of your security state in AWS and helps you check your compliance with security standards and best practices. Aggregates, organizes, and prioritizes security alerts from multiple AWS services.

Amazon GuardDuty

Provides intelligent threat detection for your AWS accounts and workloads. Continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts and workloads.

Amazon Inspector

Automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Automatically assesses applications for exposure, vulnerabilities, and deviations from best practices.

AWS Trusted Advisor

Provides recommendations that help you follow AWS best practices. Trusted Advisor evaluates your account using checks, including security checks, to help you optimize your AWS infrastructure.

Amazon Detective

Makes it easy to analyze, investigate, and quickly identify the root cause of security findings or suspicious activities. Automatically collects log data from your AWS resources and uses machine learning to create a unified view.

AWS Config

Enables you to assess, audit, and evaluate the configurations of your AWS resources. Helps you maintain compliance with security standards and best practices through continuous monitoring.

Benefits of staying up to date with security threats and recommendations

  • Proactive security posture: Address security issues before they can be exploited
  • Reduced risk: Minimize the likelihood and impact of security incidents
  • Faster response: Quickly identify and respond to emerging threats
  • Improved decision-making: Make informed security decisions based on current information
  • Enhanced compliance: Stay aligned with evolving compliance requirements
  • Optimized security investments: Focus resources on addressing the most relevant threats