Skip to content
This repository was archived by the owner on Sep 27, 2024. It is now read-only.

Commit 1c3511f

Browse files
authored
stop the pain (#32)
1 parent 33a2ad8 commit 1c3511f

1 file changed

Lines changed: 31 additions & 31 deletions

File tree

security-alerts/events.tf

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -34,35 +34,35 @@ resource "aws_cloudwatch_event_target" "target" {
3434
}
3535

3636
# Security hub nessus only
37-
resource "aws_cloudwatch_event_rule" "nessus" {
38-
name = "sechub-findings-to-lambda-nessus"
39-
description = "Sends Security Hub nessus findings to a Slack Lambda"
40-
role_arn = aws_iam_role.sfn_target_role.arn
41-
event_pattern = <<EOF
42-
{
43-
"source": [
44-
"aws.securityhub"
45-
],
46-
"detail-type": [
47-
"Security Hub Findings - Imported"
48-
],
49-
"detail": {
50-
"findings": {
51-
"RecordState": ["ACTIVE"],
52-
"WorkflowState": ["NEW"],
53-
"Severity": {
54-
"Label": [ "CRITICAL" ]
55-
},
56-
"ProductName": [ "Default" ]
57-
}
58-
}
59-
}
60-
EOF
61-
}
37+
# resource "aws_cloudwatch_event_rule" "nessus" {
38+
# name = "sechub-findings-to-lambda-nessus"
39+
# description = "Sends Security Hub nessus findings to a Slack Lambda"
40+
# role_arn = aws_iam_role.sfn_target_role.arn
41+
# event_pattern = <<EOF
42+
# {
43+
# "source": [
44+
# "aws.securityhub"
45+
# ],
46+
# "detail-type": [
47+
# "Security Hub Findings - Imported"
48+
# ],
49+
# "detail": {
50+
# "findings": {
51+
# "RecordState": ["ACTIVE"],
52+
# "WorkflowState": ["NEW"],
53+
# "Severity": {
54+
# "Label": [ "CRITICAL" ]
55+
# },
56+
# "ProductName": [ "Default" ]
57+
# }
58+
# }
59+
# }
60+
# EOF
61+
# }
6262

63-
resource "aws_cloudwatch_event_target" "nessus" {
64-
rule = aws_cloudwatch_event_rule.nessus.name
65-
target_id = aws_cloudwatch_event_rule.nessus.name
66-
arn = aws_sfn_state_machine.sechub_state_machine.arn
67-
role_arn = aws_iam_role.sfn_target_role.arn
68-
}
63+
# resource "aws_cloudwatch_event_target" "nessus" {
64+
# rule = aws_cloudwatch_event_rule.nessus.name
65+
# target_id = aws_cloudwatch_event_rule.nessus.name
66+
# arn = aws_sfn_state_machine.sechub_state_machine.arn
67+
# role_arn = aws_iam_role.sfn_target_role.arn
68+
# }

0 commit comments

Comments
 (0)