Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions,
see Getting Started with Amazon Web Services in China
(PDF).
Disabling a control across
standards
We recommend disabling an Amazon Security Hub Cloud Security Posture Management (CSPM) control across standards to maintain alignment
throughout your organization. If you disable a control in only specific standards, you
continue to receive findings for the control if it is enabled in other standards.
Cross-standard disablement in multiple accounts and Regions
To disable a security control across multiple Amazon Web Services accounts and Amazon Web Services Regions,
you must use central
configuration.
When you use central configuration, the delegated administrator can create Security Hub CSPM
configuration policies that disable specified controls across enabled standards. You
can then associate the configuration policy with specific accounts, OUs, or the
root. A configuration policy takes effect in your home Region (also called an
aggregation Region) and all linked Regions.
Configuration policies offer customization. For example, you can choose to disable
all Amazon CloudTrail controls in one OU, and you can choose to disable all IAM controls in
another OU. The level of granularity depends on your intended goals for security
coverage in your organization. For instructions on creating a configuration policy
that disables specified controls across standards, see Creating and associating configuration policies.
The delegated administrator can create configuration policies to manage
controls in all standards except the Service-Managed Standard: Amazon Control Tower. Controls for this standard should be configured
in the Amazon Control Tower service.
If you want some accounts to configure their own controls rather than the
delegated administrator, the delegated administrator can designate those accounts as
self-managed. Self-managed accounts must configure controls separately in each
Region.
Cross-standard disablement in a
single account and Region
If you don't use central configuration or are a self-managed account, you
can't use configuration policies to centrally disable controls in multiple accounts
and Regions. However, you can disable a control in a single account and
Region.
- Security Hub CSPM console
-
To disable a control across standards in one account and
Region
Open the Amazon Security Hub Cloud Security Posture Management (CSPM) console at https://console.amazonaws.cn/securityhub/.
-
Choose Controls from the navigation
pane.
-
Choose the option next to a control.
-
Choose Disable Control. This option
doesn't appear for a control that's already disabled.
-
Select a reason for disabling the control, and confirm by
choosing Disable.
-
Repeat in each Region in which you want to disable the
control.
- Security Hub CSPM API
-
To disable a control across standards in one account and
Region
-
Invoke the ListStandardsControlAssociations
API. Provide a security control ID.
Example request:
{
"SecurityControlId": "IAM.1
"
}
-
Invoke the BatchUpdateStandardsControlAssociations
API. Provide the ARN of any standards that the control is
enabled in. To obtain standard ARNs, run DescribeStandards
.
-
Set the AssociationStatus
parameter equal to
DISABLED
. If you follow these steps for a
control that's already disabled, the API returns an HTTP
status code 200 response.
Example request:
{
"StandardsControlAssociationUpdates": [{"SecurityControlId": "IAM.1
", "StandardsArn": "arn:aws-cn:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0
", "AssociationStatus": "DISABLED", "UpdatedReason": "Not applicable to environment
"}, {"SecurityControlId": "IAM.1
", "StandardsArn": "arn:aws-cn:securityhub:::standards/aws-foundational-security-best-practices/v/1.0.0
", "AssociationStatus": "DISABLED", "UpdatedReason": "Not applicable to environment
"}}]
}
-
Repeat in each Region in which you want to disable the
control.
- Amazon CLI
-
To disable a control across standards in one account and
Region
-
Run the list-standards-control-associations
command. Provide a security control ID.
aws securityhub --region us-east-1
list-standards-control-associations --security-control-id CloudTrail.1
-
Run the batch-update-standards-control-associations
command. Provide the ARN of any standards that the control
is enabled in. To obtain standard ARNs, run the
describe-standards
command.
-
Set the AssociationStatus
parameter equal to
DISABLED
. If you follow these steps for a
control that's already disabled, the command returns an HTTP
status code 200 response.
aws securityhub --region us-east-1
batch-update-standards-control-associations --standards-control-association-updates '[{"SecurityControlId": "CloudTrail.1
", "StandardsArn": "arn:aws-cn:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0
", "AssociationStatus": "DISABLED", "UpdatedReason": "Not applicable to environment
"}, {"SecurityControlId": "CloudTrail.1
", "StandardsArn": "arn:aws-cn:securityhub:::standards/cis-aws-foundations-benchmark/v/1.4.0
", "AssociationStatus": "DISABLED", "UpdatedReason": "Not applicable to environment
"}]'
-
Repeat in each Region in which you want to disable the
control.