tenable-aws-sechub


Nametenable-aws-sechub JSON
Version 2.0.1 PyPI version JSON
download
home_pageNone
SummaryTenable Vulnerability Management to AWS Security Hub
upload_time2024-07-17 14:09:43
maintainerNone
docs_urlNone
authorNone
requires_pythonNone
licenseMIT License
keywords tenable tenable vulnerability management tenable security center tenable.io tenable.sc aws security hub
VCS
bugtrack_url
requirements arrow restfly typer tomlkit boto3 rich pytenable
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # Tenable Vulnerability Management to AWS Transformer

| :exclamation: | If upgrading from v1 please read the upgrade section |
| --------------|:---------------------------------------------------- |

This tool is designed to consume Tenable.io asset and vulnerability data,
transform that data into the AWS Security Hub Finding format, and then upload
the resulting data into AWS Security Hub.

The tool can be run as either a one-shot docker container or as a command-line
tool. To run as a docker image, you'll need to build the image and then pass
the config file to the container.

## Requirements

- The Tenable Vulnerability Management Integration for Security Hub must be
  configured to accept findings from the integration.
- At a minimum the configuration file must have the account id that the events
  will be sent to.  Ideally the region should be configured as well.
- A set of API Keys within TVM should be configured to allow exportation of
  assets and vulnerability findings from the platform.  These keys should be
  wither configured within the configuration file or as environment variables

## Installation

```
pip install tenable_aws_sechub
```

## Upgrading from v1

If you are upgrading from the original version of the integration, please note
that there are some additional steps that need to be taken as the ARN that is
used has changed.

1. Disable the Tenable.io SecurityHub integration
2. Enable the Tenable Vulnerability Management integration
3. Configure and run the updated integration (this code)

## Configuration

Simply build a configuration file (or use the [example file][cfg] provided)
with the following details:

```toml
aws_account_id = 12344567890
aws_region = "us-east-1"
access_key = "1234567890abcdef1234567890"
secret_key = "1234567890abcdef1234567890"
```

Once the configuration file is saved, go ahead and ensure that the AWS CLI can
communicate to AWS, or generate the appropriate configuration parameters that
AWS needs for their boto3 client.  Details for how to do this is documented
below:

1. [Boto3 Configuration](https://boto3.amazonaws.com/v1/documentation/api/latest/guide/quickstart.html#configuration)
2. [AWS CLI Config](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-configure.html)

## Running the integration

```
❯ tvm2aws --configfile /path/to/config.toml
```


## Commandline options

```
❯ tvm2aws --help

 Usage: tvm2aws [OPTIONS]

 Tenable to AWS Security Hub vulnerability finding importer.

╭─ Options ───────────────────────────────────────────────────────────────────╮
│ --configfile          PATH                  [default: tvm2aws.toml]         │
│ --verbose     -v      INTEGER RANGE [x<=5]  [default: 2]                    │
│ --help                                      Show this message and exit.     │
╰─────────────────────────────────────────────────────────────────────────────╯
```

[cfg]: tvm2aws.toml

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "tenable-aws-sechub",
    "maintainer": null,
    "docs_url": null,
    "requires_python": null,
    "maintainer_email": null,
    "keywords": "tenable, tenable vulnerability management, tenable security center, tenable.io, tenable.sc, aws, security hub",
    "author": null,
    "author_email": "\"Tenable, Inc.\" <smcgrath@tenable.com>",
    "download_url": "https://files.pythonhosted.org/packages/ef/10/eb6e9684f278b3b519b28e2bb2a8f57eb3cfd2edcd3d0ab9252c06fe08cd/tenable_aws_sechub-2.0.1.tar.gz",
    "platform": null,
    "description": "# Tenable Vulnerability Management to AWS Transformer\n\n| :exclamation: | If upgrading from v1 please read the upgrade section |\n| --------------|:---------------------------------------------------- |\n\nThis tool is designed to consume Tenable.io asset and vulnerability data,\ntransform that data into the AWS Security Hub Finding format, and then upload\nthe resulting data into AWS Security Hub.\n\nThe tool can be run as either a one-shot docker container or as a command-line\ntool. To run as a docker image, you'll need to build the image and then pass\nthe config file to the container.\n\n## Requirements\n\n- The Tenable Vulnerability Management Integration for Security Hub must be\n  configured to accept findings from the integration.\n- At a minimum the configuration file must have the account id that the events\n  will be sent to.  Ideally the region should be configured as well.\n- A set of API Keys within TVM should be configured to allow exportation of\n  assets and vulnerability findings from the platform.  These keys should be\n  wither configured within the configuration file or as environment variables\n\n## Installation\n\n```\npip install tenable_aws_sechub\n```\n\n## Upgrading from v1\n\nIf you are upgrading from the original version of the integration, please note\nthat there are some additional steps that need to be taken as the ARN that is\nused has changed.\n\n1. Disable the Tenable.io SecurityHub integration\n2. Enable the Tenable Vulnerability Management integration\n3. Configure and run the updated integration (this code)\n\n## Configuration\n\nSimply build a configuration file (or use the [example file][cfg] provided)\nwith the following details:\n\n```toml\naws_account_id = 12344567890\naws_region = \"us-east-1\"\naccess_key = \"1234567890abcdef1234567890\"\nsecret_key = \"1234567890abcdef1234567890\"\n```\n\nOnce the configuration file is saved, go ahead and ensure that the AWS CLI can\ncommunicate to AWS, or generate the appropriate configuration parameters that\nAWS needs for their boto3 client.  Details for how to do this is documented\nbelow:\n\n1. [Boto3 Configuration](https://boto3.amazonaws.com/v1/documentation/api/latest/guide/quickstart.html#configuration)\n2. [AWS CLI Config](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-configure.html)\n\n## Running the integration\n\n```\n\u276f tvm2aws --configfile /path/to/config.toml\n```\n\n\n## Commandline options\n\n```\n\u276f tvm2aws --help\n\n Usage: tvm2aws [OPTIONS]\n\n Tenable to AWS Security Hub vulnerability finding importer.\n\n\u256d\u2500 Options \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u256e\n\u2502 --configfile          PATH                  [default: tvm2aws.toml]         \u2502\n\u2502 --verbose     -v      INTEGER RANGE [x<=5]  [default: 2]                    \u2502\n\u2502 --help                                      Show this message and exit.     \u2502\n\u2570\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u256f\n```\n\n[cfg]: tvm2aws.toml\n",
    "bugtrack_url": null,
    "license": "MIT License",
    "summary": "Tenable Vulnerability Management to AWS Security Hub",
    "version": "2.0.1",
    "project_urls": {
        "Changelog": "https://github.com/tenable/Security-Hub/blob/main/CHANGELOG.md",
        "Homepage": "https://github.com/tenable/Security-Hub",
        "Issues": "https://github.com/tenable/Security-Hub/issues",
        "Repository": "https://github.com/tenable/Security-Hub"
    },
    "split_keywords": [
        "tenable",
        " tenable vulnerability management",
        " tenable security center",
        " tenable.io",
        " tenable.sc",
        " aws",
        " security hub"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "099edaca254ed9ef660ed11113036bf78b055ec03754a20478d1e192c0ac42c8",
                "md5": "62ce3b8a637165d0b99a5c966d213c21",
                "sha256": "e7a32f5dde28270305be105cf6ad24d901dafc7b11a014ce5444d638d4524ff6"
            },
            "downloads": -1,
            "filename": "tenable_aws_sechub-2.0.1-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "62ce3b8a637165d0b99a5c966d213c21",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": null,
            "size": 8170,
            "upload_time": "2024-07-17T14:09:42",
            "upload_time_iso_8601": "2024-07-17T14:09:42.181163Z",
            "url": "https://files.pythonhosted.org/packages/09/9e/daca254ed9ef660ed11113036bf78b055ec03754a20478d1e192c0ac42c8/tenable_aws_sechub-2.0.1-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "ef10eb6e9684f278b3b519b28e2bb2a8f57eb3cfd2edcd3d0ab9252c06fe08cd",
                "md5": "eff8c0413efd8914b67c5c9f0000a597",
                "sha256": "c209962e2cc9973c3630f48b8a5cae784e3305062ca6d4241535852744db1e96"
            },
            "downloads": -1,
            "filename": "tenable_aws_sechub-2.0.1.tar.gz",
            "has_sig": false,
            "md5_digest": "eff8c0413efd8914b67c5c9f0000a597",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 10726,
            "upload_time": "2024-07-17T14:09:43",
            "upload_time_iso_8601": "2024-07-17T14:09:43.471809Z",
            "url": "https://files.pythonhosted.org/packages/ef/10/eb6e9684f278b3b519b28e2bb2a8f57eb3cfd2edcd3d0ab9252c06fe08cd/tenable_aws_sechub-2.0.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-07-17 14:09:43",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "tenable",
    "github_project": "Security-Hub",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "requirements": [
        {
            "name": "arrow",
            "specs": [
                [
                    "==",
                    "1.3.0"
                ]
            ]
        },
        {
            "name": "restfly",
            "specs": [
                [
                    "==",
                    "1.4.5"
                ]
            ]
        },
        {
            "name": "typer",
            "specs": [
                [
                    "==",
                    "0.9.0"
                ]
            ]
        },
        {
            "name": "tomlkit",
            "specs": [
                [
                    "==",
                    "0.12.4"
                ]
            ]
        },
        {
            "name": "boto3",
            "specs": [
                [
                    "==",
                    "1.34.68"
                ]
            ]
        },
        {
            "name": "rich",
            "specs": [
                [
                    "==",
                    "13.3.1"
                ]
            ]
        },
        {
            "name": "pytenable",
            "specs": [
                [
                    "==",
                    "1.4.20"
                ]
            ]
        }
    ],
    "lcname": "tenable-aws-sechub"
}
        
Elapsed time: 5.01665s