Disabling a control in a specific standard - Amazon Security Hub
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Disabling a control in a specific standard

You can disable a control in only specific security standards, instead of across all standards. If the control applies to other enabled standards, Amazon Security Hub Cloud Security Posture Management (CSPM) continues to run security checks for the control and you continue to receive findings for the control.

We recommend aligning the enablement status of a control across all of the enabled standards that the control applies to. For information about disabling a control across all of the standards that it applies to, see Disabling a control across standards.

On the standards details page, you can also disable controls in specific standards. You must disable controls in specific standards separately in each Amazon Web Services account and Amazon Web Services Region. When you disable a control in specific standards, it affects only the current account and Region.

Choose your preferred method, and follow these steps to disable a control in one or more specific standards.

Security Hub CSPM console
To disable a control in a specific standard
  1. Open the Amazon Security Hub Cloud Security Posture Management (CSPM) console at https://console.amazonaws.cn/securityhub/.

  2. Choose Security standards from the navigation pane. Choose View results for the relevant standard.

  3. Select a control.

  4. Choose Disable Control. This option doesn't appear for a control that's already disabled.

  5. Provide a reason for disabling the control, and confirm by choosing Disable.

Security Hub CSPM API
To disable a control in a specific standard
  1. Run ListSecurityControlDefinitions, and provide a standard ARN to get a list of available controls for a specific standard. To obtain a standard ARN, run DescribeStandards. This API returns standard-agnostic security control IDs, not standard-specific control IDs.

    Example request:

    { "StandardsArn": "arn:aws-cn:securityhub:::standards/aws-foundational-security-best-practices/v/1.0.0" }
  2. Run ListStandardsControlAssociations, and provide a specific control ID to return the current enablement status of a control in each standard.

    Example request:

    { "SecurityControlId": "IAM.1" }
  3. Run BatchUpdateStandardsControlAssociations. Provide the ARN of the standard in which you want to disable the control.

  4. Set the AssociationStatus parameter equal to DISABLED. If you follow these steps for a control that's already disabled, the API returns an HTTP status code 200 response.

    Example request:

    { "StandardsControlAssociationUpdates": [{"SecurityControlId": "IAM.1", "StandardsArn": "arn:aws-cn:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0", "AssociationStatus": "DISABLED", "UpdatedReason": "Not applicable to environment"}] }
Amazon CLI
To disable a control in a specific standard
  1. Run the list-security-control-definitions command, and provide a standard ARN to get a list of available controls for a specific standard. To obtain a standard ARN, run describe-standards. This command returns standard-agnostic security control IDs, not standard-specific control IDs.

    aws securityhub --region us-east-1 list-security-control-definitions --standards-arn "arn:aws-cn:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0"
  2. Run the list-standards-control-associations command, and provide a specific control ID to return the current enablement status of a control in each standard.

    aws securityhub --region us-east-1 list-standards-control-associations --security-control-id CloudTrail.1
  3. Run the batch-update-standards-control-associations command. Provide the ARN of the standard in which you want to disable the control.

  4. Set the AssociationStatus parameter equal to DISABLED. If you follow these steps for a control that's already enabled, the command returns an HTTP status code 200 response.

    aws securityhub --region us-east-1 batch-update-standards-control-associations --standards-control-association-updates '[{"SecurityControlId": "CloudTrail.1", "StandardsArn": "arn:aws-cn:securityhub:us-east-1::standards/aws-foundational-security-best-practices/v/1.0.0", "AssociationStatus": "DISABLED", "UpdatedReason": "Not applicable to environment"}]'