Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Review and Identify Unnecessary Config Rules to Reduce Security Hub Alerts #8961

Open
5 tasks
sukeshreddyg opened this issue Jan 15, 2025 · 0 comments
Open
5 tasks
Labels

Comments

@sukeshreddyg
Copy link
Contributor

User Story

As a Security Engineer,
I want to review the existing config rules and identify which ones are unnecessary, so that we can discuss and decide on actions to reduce the number of alerts sent to Security Hub.

Value / Purpose

By identifying unnecessary config rules, we can reduce the volume of alerts in Security Hub, which will help improve the efficiency of alert management and prioritization of critical findings.

Context / Background

It has been observed that several config rules were created a long time ago, and many of them may no longer be relevant or necessary. These rules are generating a high number of security findings, which are sent to Security Hub. Reviewing and identifying which rules are unnecessary will help us streamline the process and address alert overload.

Useful Contacts

No response

Additional Information

No response

Definition of Done

  • A thorough review of all existing config rules is conducted.
  • A list of config rules that are potentially unnecessary or redundant is created.
  • The list is shared with the team for further discussion and evaluation.
  • If the team agrees, the identified config rules will be removed.
  • The list of unnecessary config rules is documented and made available for future action.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Status: To Do
Development

No branches or pull requests

2 participants