Skip to content

Conversation

@jrgaray27
Copy link
Member

Issue #, if available:

Description of changes:

[3.0.0] - 2025-11-13

Added

  • Optional Web User Interface to run remediations, view past remediations, and delegate access to the solution
    • When the ShouldDeployWebUI parameter is "yes", you must enter a value for AdminUserEmail which will be granted administrator access to the Web UI. You will receive temporary credential and a login link via email.
    • Deploying the Web UI provisions additional resources such as a CloudFront distribution, Cognito User Pool, S3 bucket for hosting, and more.
  • Support for Security Control findings in Security Hub v2
    • The solution continues to support Security Hub CSPM in addition to Security Hub v2
  • API Gateway REST API to support the new Web User Interface
  • Automated remediation filtering capabilities based on Account ID, Organizational Unit ID, and resource tags
    • Controlled via SSM parameters under ASR/Filters/
  • Pre-Processor Lambda function to centralize processing of Security Hub finding events
  • DynamoDB tables to store Security Hub finding data, remediation history data, and automated remediation settings
  • Complete list of supported control IDs in solutions-reference/automated-security-response-on-aws/latest/supported-controls.json
  • EventBridge rule to run a weekly refresh of the Findings DynamoDB table
  • EventBridge rule to capture and handle Step Function failures in the Orchestrator

Changed

  • Security Hub events are now consumed by a single EventBridge rule and forwarded to the Pre-processor
  • Enabling / Disabling automated remediations is now controlled by the Remediation Configuration DynamoDB table, which can be modified post-deployment. See the Implementation Guide for details.
    • You can find the DynamoDB table name in the Stack Outputs after deploying the Admin stack
    • Automated remediations are still toggled per Control ID, and are disabled by default
  • Updated several dependencies to address security vulnerabilities
  • Migrated to Node's built-in randomUUID() instead of importing uuid
  • This solution sends operational metrics to AWS (the "Data") about the use of this solution. We use this Data to better understand how customers use this solution and related services and products. AWS’s collection of this Data is subject to the AWS Privacy Notice.

Removed

  • EventBridge rules per Control ID
  • Filtering configuration in Admin stack parameters
    • Filtering settings are now configurable in Systems Manager Parameter Store, e.g. ASR/Filters/AccountFilters

Fixed

  • S3.1 control ID in the CIS v3 playbook (2.1.4 -> 2.1.4.1)
  • Improved logic in EnableCloudTrailToCloudWatchLogging_waitforloggroup remediation script
  • Finding link in SNS notifications now links to the finding directly, instead of the control view in the Security Hub console
  • Fixed bugs in CloudTrail.5 and CloudWatch.1 remediations
  • Fixed resource ID parameter in CloudTrail.4 and CloudTrail.7 control runbooks
  • Improved error handling in the Orchestrator Step Function
  • Included CreateServiceLinkedRole permissions in GuardDuty.1 remediation role

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

@jrgaray27 jrgaray27 marked this pull request as ready for review November 12, 2025 16:57
@gsingh04 gsingh04 merged commit de91576 into main Nov 13, 2025
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants