On This Page

Home / Stream/ Integrations/ Integrating with Other Services/ Amazon/Integrate Cribl Stream with AWS Security Hub

Integrate Cribl Stream with AWS Security Hub

You can integrate Cribl Stream with AWS Security Hub to enable your security teams to ingest, standardize, and route Security Hub findings in near real time. This integration streamlines security operations by providing a unified, flexible, and extensible data pipeline for AWS security events, leveraging the Open Cybersecurity Schema Framework (OCSF) v1.6 for consistent data structure and interoperability.

Key features include:

  • Near real-time ingestion of AWS Security Hub findings via AWS EventBridge and Cribl Stream Webhook.
  • Standardization of findings to OCSF v1.6, including support for AWS-specific extensions.
  • Flexible routing to multiple destinations, including Cribl Lake, SIEMs, and data warehouses.
  • Support for transforming and enriching third-party security findings.
  • Secure, scalable architecture with recommended authentication and IAM permissions.

Architecture and Data Flow

This integration uses an event-driven architecture to deliver Security Hub findings to Cribl Stream for processing and routing:

  1. AWS Security Hub generates a finding.
  2. AWS EventBridge captures the finding event.
  3. An EventBridge Rule filters and forwards events to a target.
  4. The target is typically an AWS SNS Topic, which pushes the data to a Cribl Stream HTTP Endpoint (Webhook).
  5. Cribl Stream receives the data, processes and standardizes it (for example, to OCSF v1.6), and routes it to one or more Destinations.

Configure Event Streaming from AWS Security Hub to Cribl Stream

The workflow to configure event streaming from AWS Security Hub to Cribl Stream consists of four parts:

  1. Create an Amazon SNS topic.
  2. Configure a Cribl Stream HTTP Endpoint as an SNS subscription.
  3. Create an EventBridge rule in the AWS Management Console.
  4. Enable the Webhook in Cribl Stream.

Create an Amazon SNS Topic

  1. In the AWS Management Console, go to Simple Notification Service (SNS).
  2. Create a new topic (for example, Cribl-SecurityHub-Findings).

Configure a Cribl Stream HTTP Endpoint as an SNS Subscription

  1. In Cribl Stream, navigate to Sources and enable an HTTP Endpoint (Webhook). Copy the unique URL.
  2. In AWS SNS, create a subscription for the topic created above. The Protocol is HTTPS. For the URL, paste the Cribl Stream HTTP Endpoint URL.

Create an EventBridge Rule

  1. In the AWS Management Console, go to Amazon EventBridge.
  2. Select Create rule and provide a descriptive name (for example, SecurityHub-to-Cribl).
  3. Define the event pattern as follows:
    • Event source: AWS services

    • AWS service: Security Hub

    • Event type: Security Hub Findings - Custom Action or Security Hub Findings - Imported

      Example format:

       {
        "source": ["aws.securityhub"],
        "detail-type": ["Security Hub Findings - Imported"]
       }
    • Set the target to the SNS Topic created in Step 1.

Enable the Webhook in Cribl Stream

  1. In Cribl Stream, go to Data > Sources.
  2. Select Add new and select HTTP Endpoint.
    • Input ID: Provide a unique ID (for example, securityhub_webhook).
    • Authentication: Configure Shared Secret authentication for security.

    For advanced customization, consider using an intermediate Lambda or API Gateway.

    • Output: Connect the source to a specific pipeline (for example, securityhub_pipeline) for OCSF conversion and routing.

Process and Standardize Data in Cribl Stream

Next, you can pre-process the data, standardize the JSON payload, and optionally enrich data with external or internal events.

  1. Handle the SNS envelope/wrapper if present.
  2. Convert the Security Hub JSON payload to OCSF v1.6 format, adding AWS context/extensions as needed.
  3. Optionally add external or internal data (for example, CMDB lookups, CloudTrail events).

Route Findings and Manage Destinations

After processing, you can route Security Hub findings to multiple destinations:

Destination ServiceCribl Stream Destination TypePurpose
Cribl LakeAmazon S3 (managed by Cribl)Long-term, cost-effective storage for historical analysis and compliance.
SIEM PlatformSplunk HEC, Kafka, ElasticSearchReal-time security analysis, alerting, and incident response.
Data WarehouseAmazon S3, Snowflake, Google BigQueryBusiness intelligence and operational reporting on security trends.

This flexible routing ensures Security Hub findings are immediately available for analysis and archival across your security ecosystem.

Transform Third-Party Findings

Cribl Stream can also convert third-party security findings into OCSF v1.6, including AWS-specific extensions. This enables a unified approach to security data management, regardless of the original source format.

Original SourceOriginal FormatCribl Stream ActionOutput Format
Third-Party Tool 1ProprietaryConvert and Add AWS ExtensionsOCSF v1.6 with AWS Extensions
Third-Party Tool 2Custom JSONConvert and Add AWS ExtensionsOCSF v1.6 with AWS Extensions

Required Identity Access Management (IAM) Permissions

To enable robust integration, ensure the IAM role associated with your Cribl deployment has the following permissions (at minimum):

EndpointPermission(s)
ec2_instances, and so forthec2:DescribeInstances, ec2:DescribeVolumes, ec2:DescribeSecurityGroups, and so forth
lambda_functionslambda:ListFunctions
iam_*iam:ListPolicies, iam:ListRoles, iam:ListUsers, iam:ListGroups, iam:ListMFADevices
cloudformation_*cloudformation:ListExports, cloudformation:ListStacks, cloudformation:ListStackSets
dynamodb_backupsdynamodb:ListBackups
rds_*rds:DescribeDBInstances, rds:DescribeDBClusterEndpoints, and so forth
cloudtrail_eventscloudtrail:LookupEvents
vpc_*ec2:DescribeNetworkInterfaces, ec2:DescribeVpcs, ec2:DescribeSubnets
efs_file_systemselasticfilesystem:DescribeFileSystems

For a full list and details, see the Cribl documentation on AWS API permissions.

Security Best Practices

We recommend following these best practices to keep your AWS Security Hub integration safe:

  • Always use Shared Secret authentication for HTTP Endpoints.
  • Limit IAM permissions to the minimum required for your use case.
  • Use AWS CloudFormation templates provided by Cribl for automated, secure setup of IAM roles and trust relationships.

Getting Started

If you are new to AWS Security Hub or Cribl Stream, refer to the following resources: