# Tenable Vulnerability Management to AWS Transformer
| :exclamation: | If upgrading from v1 please read the upgrade section |
| --------------|:---------------------------------------------------- |
This tool is designed to consume Tenable.io asset and vulnerability data,
transform that data into the AWS Security Hub Finding format, and then upload
the resulting data into AWS Security Hub.
The tool can be run as either a one-shot docker container or as a command-line
tool. To run as a docker image, you'll need to build the image and then pass
the config file to the container.
## Requirements
- The Tenable Vulnerability Management Integration for Security Hub must be
configured to accept findings from the integration.
- At a minimum the configuration file must have the account id that the events
will be sent to. Ideally the region should be configured as well.
- A set of API Keys within TVM should be configured to allow exportation of
assets and vulnerability findings from the platform. These keys should be
wither configured within the configuration file or as environment variables
## Installation
```
pip install tenable_aws_sechub
```
## Upgrading from v1
If you are upgrading from the original version of the integration, please note
that there are some additional steps that need to be taken as the ARN that is
used has changed.
1. Disable the Tenable.io SecurityHub integration
2. Enable the Tenable Vulnerability Management integration
3. Configure and run the updated integration (this code)
## Configuration
Simply build a configuration file (or use the [example file][cfg] provided)
with the following details:
```toml
aws_account_id = 12344567890
aws_region = "us-east-1"
access_key = "1234567890abcdef1234567890"
secret_key = "1234567890abcdef1234567890"
```
Once the configuration file is saved, go ahead and ensure that the AWS CLI can
communicate to AWS, or generate the appropriate configuration parameters that
AWS needs for their boto3 client. Details for how to do this is documented
below:
1. [Boto3 Configuration](https://boto3.amazonaws.com/v1/documentation/api/latest/guide/quickstart.html#configuration)
2. [AWS CLI Config](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-configure.html)
## Running the integration
```
❯ tvm2aws --configfile /path/to/config.toml
```
## Commandline options
```
❯ tvm2aws --help
Usage: tvm2aws [OPTIONS]
Tenable to AWS Security Hub vulnerability finding importer.
╭─ Options ───────────────────────────────────────────────────────────────────╮
│ --configfile PATH [default: tvm2aws.toml] │
│ --verbose -v INTEGER RANGE [x<=5] [default: 2] │
│ --help Show this message and exit. │
╰─────────────────────────────────────────────────────────────────────────────╯
```
[cfg]: tvm2aws.toml
Raw data
{
"_id": null,
"home_page": null,
"name": "tenable-aws-sechub",
"maintainer": null,
"docs_url": null,
"requires_python": null,
"maintainer_email": null,
"keywords": "tenable, tenable vulnerability management, tenable security center, tenable.io, tenable.sc, aws, security hub",
"author": null,
"author_email": "\"Tenable, Inc.\" <smcgrath@tenable.com>",
"download_url": "https://files.pythonhosted.org/packages/ef/10/eb6e9684f278b3b519b28e2bb2a8f57eb3cfd2edcd3d0ab9252c06fe08cd/tenable_aws_sechub-2.0.1.tar.gz",
"platform": null,
"description": "# Tenable Vulnerability Management to AWS Transformer\n\n| :exclamation: | If upgrading from v1 please read the upgrade section |\n| --------------|:---------------------------------------------------- |\n\nThis tool is designed to consume Tenable.io asset and vulnerability data,\ntransform that data into the AWS Security Hub Finding format, and then upload\nthe resulting data into AWS Security Hub.\n\nThe tool can be run as either a one-shot docker container or as a command-line\ntool. To run as a docker image, you'll need to build the image and then pass\nthe config file to the container.\n\n## Requirements\n\n- The Tenable Vulnerability Management Integration for Security Hub must be\n configured to accept findings from the integration.\n- At a minimum the configuration file must have the account id that the events\n will be sent to. Ideally the region should be configured as well.\n- A set of API Keys within TVM should be configured to allow exportation of\n assets and vulnerability findings from the platform. These keys should be\n wither configured within the configuration file or as environment variables\n\n## Installation\n\n```\npip install tenable_aws_sechub\n```\n\n## Upgrading from v1\n\nIf you are upgrading from the original version of the integration, please note\nthat there are some additional steps that need to be taken as the ARN that is\nused has changed.\n\n1. Disable the Tenable.io SecurityHub integration\n2. Enable the Tenable Vulnerability Management integration\n3. Configure and run the updated integration (this code)\n\n## Configuration\n\nSimply build a configuration file (or use the [example file][cfg] provided)\nwith the following details:\n\n```toml\naws_account_id = 12344567890\naws_region = \"us-east-1\"\naccess_key = \"1234567890abcdef1234567890\"\nsecret_key = \"1234567890abcdef1234567890\"\n```\n\nOnce the configuration file is saved, go ahead and ensure that the AWS CLI can\ncommunicate to AWS, or generate the appropriate configuration parameters that\nAWS needs for their boto3 client. Details for how to do this is documented\nbelow:\n\n1. [Boto3 Configuration](https://boto3.amazonaws.com/v1/documentation/api/latest/guide/quickstart.html#configuration)\n2. [AWS CLI Config](https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-configure.html)\n\n## Running the integration\n\n```\n\u276f tvm2aws --configfile /path/to/config.toml\n```\n\n\n## Commandline options\n\n```\n\u276f tvm2aws --help\n\n Usage: tvm2aws [OPTIONS]\n\n Tenable to AWS Security Hub vulnerability finding importer.\n\n\u256d\u2500 Options \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u256e\n\u2502 --configfile PATH [default: tvm2aws.toml] \u2502\n\u2502 --verbose -v INTEGER RANGE [x<=5] [default: 2] \u2502\n\u2502 --help Show this message and exit. \u2502\n\u2570\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u256f\n```\n\n[cfg]: tvm2aws.toml\n",
"bugtrack_url": null,
"license": "MIT License",
"summary": "Tenable Vulnerability Management to AWS Security Hub",
"version": "2.0.1",
"project_urls": {
"Changelog": "https://github.com/tenable/Security-Hub/blob/main/CHANGELOG.md",
"Homepage": "https://github.com/tenable/Security-Hub",
"Issues": "https://github.com/tenable/Security-Hub/issues",
"Repository": "https://github.com/tenable/Security-Hub"
},
"split_keywords": [
"tenable",
" tenable vulnerability management",
" tenable security center",
" tenable.io",
" tenable.sc",
" aws",
" security hub"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "099edaca254ed9ef660ed11113036bf78b055ec03754a20478d1e192c0ac42c8",
"md5": "62ce3b8a637165d0b99a5c966d213c21",
"sha256": "e7a32f5dde28270305be105cf6ad24d901dafc7b11a014ce5444d638d4524ff6"
},
"downloads": -1,
"filename": "tenable_aws_sechub-2.0.1-py3-none-any.whl",
"has_sig": false,
"md5_digest": "62ce3b8a637165d0b99a5c966d213c21",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": null,
"size": 8170,
"upload_time": "2024-07-17T14:09:42",
"upload_time_iso_8601": "2024-07-17T14:09:42.181163Z",
"url": "https://files.pythonhosted.org/packages/09/9e/daca254ed9ef660ed11113036bf78b055ec03754a20478d1e192c0ac42c8/tenable_aws_sechub-2.0.1-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "ef10eb6e9684f278b3b519b28e2bb2a8f57eb3cfd2edcd3d0ab9252c06fe08cd",
"md5": "eff8c0413efd8914b67c5c9f0000a597",
"sha256": "c209962e2cc9973c3630f48b8a5cae784e3305062ca6d4241535852744db1e96"
},
"downloads": -1,
"filename": "tenable_aws_sechub-2.0.1.tar.gz",
"has_sig": false,
"md5_digest": "eff8c0413efd8914b67c5c9f0000a597",
"packagetype": "sdist",
"python_version": "source",
"requires_python": null,
"size": 10726,
"upload_time": "2024-07-17T14:09:43",
"upload_time_iso_8601": "2024-07-17T14:09:43.471809Z",
"url": "https://files.pythonhosted.org/packages/ef/10/eb6e9684f278b3b519b28e2bb2a8f57eb3cfd2edcd3d0ab9252c06fe08cd/tenable_aws_sechub-2.0.1.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-07-17 14:09:43",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "tenable",
"github_project": "Security-Hub",
"travis_ci": false,
"coveralls": false,
"github_actions": true,
"requirements": [
{
"name": "arrow",
"specs": [
[
"==",
"1.3.0"
]
]
},
{
"name": "restfly",
"specs": [
[
"==",
"1.4.5"
]
]
},
{
"name": "typer",
"specs": [
[
"==",
"0.9.0"
]
]
},
{
"name": "tomlkit",
"specs": [
[
"==",
"0.12.4"
]
]
},
{
"name": "boto3",
"specs": [
[
"==",
"1.34.68"
]
]
},
{
"name": "rich",
"specs": [
[
"==",
"13.3.1"
]
]
},
{
"name": "pytenable",
"specs": [
[
"==",
"1.4.20"
]
]
}
],
"lcname": "tenable-aws-sechub"
}