:exclamation: | If upgrading from v1 please read the upgrade section |
---|
This tool is designed to consume Tenable.io asset and vulnerability data, transform that data into the AWS Security Hub Finding format, and then upload the resulting data into AWS Security Hub.
The tool can be run as either a one-shot docker container or as a command-line tool. To run as a docker image, you'll need to build the image and then pass the config file to the container.
pip install tenable_aws_sechub
If you are upgrading from the original version of the integration, please note that there are some additional steps that need to be taken as the ARN that is used has changed.
Simply build a configuration file (or use the example file provided) with the following details:
aws_account_id = 12344567890
aws_region = "us-east-1"
access_key = "1234567890abcdef1234567890"
secret_key = "1234567890abcdef1234567890"
Once the configuration file is saved, go ahead and ensure that the AWS CLI can communicate to AWS, or generate the appropriate configuration parameters that AWS needs for their boto3 client. Details for how to do this is documented below:
❯ tvm2aws --configfile /path/to/config.toml
❯ tvm2aws --help
Usage: tvm2aws [OPTIONS]
Tenable to AWS Security Hub vulnerability finding importer.
╭─ Options ───────────────────────────────────────────────────────────────────╮
│ --configfile PATH [default: tvm2aws.toml] │
│ --verbose -v INTEGER RANGE [x<=5] [default: 2] │
│ --help Show this message and exit. │
╰─────────────────────────────────────────────────────────────────────────────╯