[Security] Fix AWS Security Hub findings - GuardDuty, Inspector, and SSM #7249
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
Fixes 7 HIGH/CRITICAL findings from AWS Security Hub by enabling account-level security monitoring and scanning features.
Findings Resolved:
Findings Documented as Accepted:
Changes
New Terraform files:
infra/accounts/guardduty.tf- GuardDuty detector with runtime monitoring enabledinfra/accounts/inspector.tf- Amazon Inspector scanning for EC2, ECR, Lambdainfra/accounts/ssm.tf- SSM document public sharing blockdocs/security/accepted-findings.md- Documentation of accepted/false positive findingsSecurity improvements:
Deployment Notes
Before applying, import the existing GuardDuty detector:
These are account-level settings (not environment-specific) that apply to the entire AWS account.
Validation
terraform validateterraform fmtSecurity Hub findings should update within 24 hours of applying these changes.