aws-solutions / automated-security-response-on-aws

Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a library of automated playbooks. The solution makes it easier for AWS Security Hub customers to resolve common security findings and to improve their security posture in AWS.
https://aws.amazon.com/solutions/implementations/aws-security-hub-automated-response-and-remediation/
Apache License 2.0
381 stars 108 forks source link

NIST Playbook from SC Playbook #153

Closed Outrun207 closed 1 year ago

Outrun207 commented 1 year ago

Description of changes:

Added a NIST 80053 playbook from the existing SC playbook. No additional features or automation at this time.

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

github-advanced-security[bot] commented 1 year ago

You have successfully added a new CodeQL configuration .github/workflows/codeql.yml:codeql/language:javascript. As part of the setup process, we have scanned this repository and found no existing alerts. In the future, you will see all code scanning alerts on the repository Security tab.

github-advanced-security[bot] commented 1 year ago

You have successfully added a new CodeQL configuration .github/workflows/codeql.yml:codeql/language:typescript. As part of the setup process, we have scanned this repository and found no existing alerts. In the future, you will see all code scanning alerts on the repository Security tab.

Outrun207 commented 1 year ago

Updates made to pull playbooks directly from SC exports. Added exports to SC classes where needed.

Outrun207 commented 1 year ago

The unit tests fail, but it seems to be based on a resource name that is different from the snapshot?

Additionally, my local unit tests only have two warnings.