Skip to main content
Skip table of contents

Create a Cloud Connection for AWS Security Hub


Topics Discussed

To fully use this feature, you must have the following permissions in your account:

  • Read Cloud Connections

  • Write Cloud Connections

You can use these instructions to sync your AWS account with your Nexus / AMP account. Specifically, this action will sync your account with AWS Security Hub where Armor will send security updates.

To complete these instructions, you must be able to access your AWS console.


Review Pre-Deployment Considerations


Before you configure your Nexus / AMP and AWS account, review the following pre-deployment considerations:


Security Findings

When you sync your Nexus / AMP account with AWS Security Hub, Armor will send the following information to AWS Security Hub:

SECURITY DATA

DESCRIPTION

NUMBER OF SECURITY FINDINGS

Malware

In relation to malware, Armor communicates with AWS Security Hub on an hourly basis. If Armor detects a malware event, this information will be sent to AWS Security Hub within an hour.

To learn more about Malware Protection, see Malware Protection.

The number of security findings is based on the number of virtual machines, as well as the security posture of those virtual machines.

Malware is a seldom event, with only a couple events reported per day.

Vulnerability Scanning

In relation to vulnerability scanning, Armor communicates with AWS Security Hub on a weekly basis. If Armor detects a vulnerability, this information will be sent to AWS Security Hub within a week.

For vulnerabilities, Armor will only send vulnerabilities that are critical or high, based on the CVSS scoring structure. In these cases, Armor will only send vulnerabilities that contain a score of 5.5 or higher.

To learn more about Vulnerability Scanning, see Vulnerability Scanning.

The number of security findings is based on the number of virtual machines, as well as the security posture of those virtual machines.

For large enterprise customers, the number of vulnerabilities can range from 100 to 1,000 within a weekly time frame.


Exchanging Account Information

To properly sync your Nexus / AMP account with AWS, the Armor AWS Account will assume a role in your AWS account. To accomplish this, in Nexus or AMP you will copy the Armor AWS account number and a unique external ID, and then paste into your AWS account. Afterwards, you will receive an AWS-generated ARN from the role, which you will then paste into Nexus / AMP.


ASFF Types

The following table describes the ASFF-formatted finding types for the security finding that are sent to AWS Security Hub.

FINDINGS

TYPES.NAMESPACE

TYPES.CATEGORY

TYPES.CLASSIFIER

Vulnerability

Software configurations and checks

CVE

Dynamic based on CVE (i.e. CVE-2018-2771)

Malware

TTPs

N/A

N/A


Scoring Types

The following table describes the Severity.Product scores and the Severity.Normalized scores for the security findings that are sent to AWS Security Hub.

FINDINGS

SEVERITY.PRODUCT

SEVERITY.NORMALIZED

NOTES

Vulnerabilities

While scores 0 - 10 are available to be sent, currently, Armor will only send scores 5.5 and higher.

While scores 0 - 30 are available, Armor will only send scores 5.5 and higher (5.5 * 3)

Calculation: CVSS score * 3.

Armor will only send critical and high scores.

Malware

Scores 0 -10 is available.

Scores 31 - 61 are available.

Calculation: (Severity score * 3) + 31


Updated Fields for Findings

The following fields will be updated:

  • The recordState will change to archived if the vulnerability or malware is no longer valid.

  • The updatedAt will reflect the most recent timestamp that the finding was updated.


Create a Cloud Connection account for AWS


You can use the Cloud Connections screen to sync your AWS public cloud environment with Nexus or the legacy Armor Management Portal (AMP).

To complete these instructions, you must be able to access your AWS console.

Armor will generate an External ID for every new Cloud Connection account. As result, an incomplete cloud connection account will be listed in the table as (Pending Connection). You can click this entry in order to continue with the cloud connection creation process.

Step 1: Add your AWS account:

  1. In Nexus, in the left-side navigation, hover-over Infrastructure .

  2. Click Connectors

  3. Then Cloud Connections.

Nexus - Cloud Connections screen

  1. Click + New Connection

image-20251028-020650.png

Nexus - New Cloud Connection

  1. In Account Name, enter a descriptive name.

  2. In Description, enter a short description.

  3. In Services, select the desired services.

    • To have Armor send security findings to your AWS Security Hub, mark Security Hub.

      • This action will automatically select additional services; these services must be selected.

  4. In IAM Role, copy the External ID. You will need this information at a later step.

    • The Armor's AWS Account Number and External ID fields are pre-populated.

    • Armor will generate an External ID for every new Cloud Connection you create.

    • In a later step, you will locate the information to complete the IAM Role ARN field.

  5. Access the AWS console.

  6. Under Security, Identity & Compliance, click IAM.

  7. In the left-side navigation, click Roles.

  8. Click Create role.

  9. Under Select role type, select Another AWS account.

  10. In Account ID, enter 679703615338.

  11. Mark Require external ID.

  12. In field that appears, paste the External ID you copied earlier from the Armor Management Portal (AMP).

  13. Do not mark Require MFA.

  14. Click Next: Permissions.

  15. Locate and mark the SecurityAudit policy.

  16. Locate and mark the AWSSecurityHubFullAccess policy.

  17. Click Next: Tags.

  18. Click Next: Review.

  19. In Role name, enter a descriptive name.

  20. In Role description, enter a useful description.

  21. Click Create role.

  22. Locate and select the newly created role.

  23. Under Summary, copy the Role ARN information.

  24. Return to the Cloud Connections screen in Nexus.

  25. Paste the Role ARN information into the IAM Role ARN field.

  26. Click Save Cloud Connection.

    • Once the newly added cloud connections gathers data, the instance will appear in the Virtual Machines screen.


Step 2: Configure Your AWS Regions

In this step, you will enable AWS Security Hub in the desired AWS regions; this action will capture the findings from Security Hub in every configured region.

  1. Access the AWS console.

  2. Access the Security Hub section.

  3. In the left-side navigation, click Integrations.

  4. Locate and select ARMOR Armor Anywhere.

  5. Click Enable.

  6. In the pop-up window, click Enable.

You can follow the same steps in the legacy Armor Management Portal (AMP). The Cloud Connections screen is located under Account.


View Your Added (connected) Public Cloud Instances


After you add your public cloud account into Nexus or the legacy Armor Management Portal (AMP), you can view the corresponding instances (and their security status) in the Virtual Machines screen.

The Cloud Connection screen simply lists the synced public cloud account; the Virtual Machines screen lists all the instances listed in that public cloud account.

  1. In Nexus in the left-side navigation, hover over Infrastructure .

  2. Click Compute, then Virtual Machines

Column

Description

Provider

The public cloud provider for the instance

Name

The name of the instance from your public cloud account

Created

The date the instance was created in your public cloud account

Security Group

The security group that corresponds to your AWS instance.

  • This column will only appear to AWS users.

  • This column will only appear if you have selected the EC2 Metadata and orchestration option.

Power

The power status of the instance, either powered on (green) or powered off (red)

Armor Agent

The security status of the instance, in relation to the installed agent. There are three states:

  • Unprotected indicates the agent is not installed in the instance.

  • Needs Attention indicates that the agent is installed, but has not properly communicated (heartbeated) with Armor.

  • OK indicates that the agent is installed and has communicated (hearbeated) with Armor.

Tags

Custom tags associated with the instance


Additional Documentation

To learn about the basics of Cloud Connections, see Cloud Connections.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.