# AWS Security Hub CSPM

You can enable Security Hub CSPM by going to Configuration > AWS Integrations. Read on here for more information on implementing it.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FNgCrnWrakO8ni4IFTzeu%2Fspaces_lGcQw8I2CHyi1loKBlfi_uploads_EMWWMkiWZFaiuhl61mRW_console-sechub.png?alt=media&#x26;token=76d17046-52fb-4561-a78d-833f687f43c4" alt=""><figcaption></figcaption></figure>

AWS Security Hub CSPM provides a consolidated view of your security status in AWS. Automate security checks, manage security findings, and identify the highest priority security issues across your AWS environment. We have integrated with AWS Security Hub CSPM to allow your Amazon S3 object findings (infected files and data matching classified data patterns) to be posted to this central location. Any infected or matching files found within your Amazon S3 storage can be shown and managed alongside the rest of the findings coming from all other aspects of your infrastructure.

It is very simple to start sending infected or matching scan results to AWS Security Hub CSPM. Simply toggle the switch on (becomes purple and text changes from Disabled to Enabled) and we will activate Accept Findings inside of AWS Security Hub CSPM and immediately start sending findings. You will not have to manually accept, although you can, the findings service inside the AWS Console. If you accept the service beforehand, you will still need to enable the toggle in the management console.

## **Example Finding within AWS Security Hub** CSPM **Console**

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FfSWoVuDYeaMg9JFmBcdX%2F2.png?alt=media&#x26;token=b0e52371-126a-47af-aabb-1459f16597f0" alt=""><figcaption></figcaption></figure>

## **Integration as seen inside the AWS Security Hub** CSPM **Console**

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FyZIWeD9EUsajrFM5zZR8%2F1.png?alt=media&#x26;token=a11fbabe-4167-4fec-913a-d31e3d3b1d2f" alt=""><figcaption></figcaption></figure>

{% hint style="warning" %}
We expect AWS Security Hub CSPM to be subscribed to in the region the console is running within.

Any incident found, no matter the region, will be posted to the console region's AWS Security Hub CSPM. [Contact Us](https://help.cloudstoragesec.com/contact-us) if you'd like the findings written out to the region they were found in.

Flipping the toggle to enabled when AWS Security Hub CSPM is not subscribed to will be reflected with an error.

If you Stop Accepting Findings for our solution inside the AWS Security Hub CSPM console, but do not also disable it in the Console Settings page, we will continue to try to send events and errors will be sent to logs.
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.cloudstoragesec.com/how-it-works/integrations/aws-security-hub.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
