AWS Security Hub centralizes and prioritizes security findings from AWS and third-party tools, providing a unified view of your security posture using compliance standards and a common format (ASFF). For detailed information refer to the AWS Security Hub’s official documentation.
Integration Method: HTTP Collector. Refer to this article for API ingestion
Tables: Data Security Finding [2006], Detection Finding [2004], Vulnerability Finding [2002], Compliance Finding [2003]
This integration supports the following events.
Event | Description |
|---|---|
Findings | Get the list of AWS Security Hub Finding Events |
Note:
AWS Security Hub doesn’t follow a traditional versioning system. It is a continuously updated cloud service.
Prerequisites
The user should have access to the AWS portal.
The user should have access to the Security Hub dashboard.
The user should have permissions to create EventBridge rules, connections, and API destinations.
The user should have access to the DataBee console.
Configuration Overview
Create an AWS Security Hub HTTP Collector data feed in DataBee to receive and process Security Hub findings.
Configure an EventBridge API Destination using the DataBee HTTP Collector URL and Authorization Key.
Create an EventBridge Rule forward findings from AWS Security Hub to the configured API Destination.
The Event Bridge setup can be automated using Terraform scripts as described in this section.
DataBee Configuration
Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.

Search for AWS Security Hub and click on it as shown below.

Enter feed contact information and click Next.

In the configuration page, confirm the following and click Next.
Format: Select JSON data format option.

Use the Copy to clipboard button to copy the Endpoint URL and Tenant ID for later use, and then click Generate New API Key.
Use the Copy to clipboard button to copy the API Key and keep it for later use.

Click Submit.
Go to Data tab > Data Feeds > Select the configured Data feed > Copy the DataSource ID for later use.

AWS Security Hub Configuration
Configure an EventBridge API Destination
Log in to AWS using an account that has permissions to manage Amazon EventBridge and access AWS Security Hub findings. The user must have IAM permissions such as events: * (for creating and managing EventBridge rules) and securityhub:GetFindings (for accessing Security Hub findings) and open the EventBridge console.
Note:
* means all permissions in that category.

In the left navigation pane, choose Integration > API destinations.

Scroll down to the API destinations table and then choose Create API destination.

On Create API destination,
Enter a ‘Name’ for API Destination (The name must be unique to your account in the current Region)
In the ‘API destination endpoint’ field, paste the HTTP URL from DataBee earlier.
Select the ‘HTTP method’ as POST.
In ‘Connection configuration’, select Create a new connection.

For Connection configuration,
Provide a ‘Connection name’.
Under ‘Configure invocation’, keep Public as the ‘API Type’.

Select API Key in the ‘Authorization type’.
Enter the ‘API key name’ as Authorization.
Paste the API key ‘value’ from DataBee.
Click Create.

Create an EventBridge Rule
Open the Amazon EventBridge Console.

In the navigation pane, click Rules.

Click on Create rule.

Under Define rule detail,
Provide a rule ‘Name’.
Click Next.

Under Build event pattern,
Select AWS events or EventBridge partner events as an ‘Event source’.
Set the ‘Event source’ for AWS services.
Choose Security Hub as the ‘AWS service’.
Select Finding Imported V2 in ‘Event type’.

Click Next.

Under Select target(s),
Choose EventBridge API destination as ‘Target type’.
Choose Use an existing API destination option for ‘API destination’ and select the API Destination created earlier in the API Destination section.
Under add ‘Header Parameters’, Add the following three header parameters:
Tenant ID
Key: TenantID
Value: Paste the Tenant ID from DataBee.
Authorization
Key: Authorization
Value: Paste the API Key from DataBee.
Datasource ID
Key: DatasourceID
Value: Paste the Datasource ID from DataBee.

Click Next.

Under Configure tags – optional, Click Next.

Review all configuration details of the rule and click on Create rule.

Optional: EventBridge Configuration via Terraform
As an alternative, the EventBridge configuration can be automated by using Terraform scripts. The scripts can be found as files on the right hand column of this article.
Prerequisite
Install Terraform by following the official guide: Terraform Installation Guide.
Refer to the Terraform AWS Provider documentation.
Configuration Steps
Set Up AWS Credentials
Configure the AWS credentials using the following environment variables:
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
For more details, see the Terraform AWS Provider Documentation.
Update Terraform Configuration Files
Update the variables defined in the aws_securityhub_terraform.tfvars file.
Update the region parameter in the AWS provider block within aws_securityhub_main.tf to match the target deployment region.
Deploy the Infrastructure
Execute the following Terraform commands in sequence:
terraform init terraform apply
Troubleshooting Tips
How can I check if my account has permission to manage EventBridge?
In the AWS Management Console, go to EventBridge → Rules. If you can view, create, or edit rules, your account has the required permissions. If the option is disabled or you see an “Access Denied” message, contact your administrator to verify your IAM permissions.Why am I not seeing Security Hub events in EventBridge?
Make sure Security Hub is enabled in the same region and that EventBridge has an active rule with the event source set to aws.securityhub.My rule is not triggering — what should I check?
Verify that the rule state is set to Enabled, the event pattern matches Security Hub findings, and the target (API destination) is active and reachable.How do I confirm that events are reaching my API destination?
In EventBridge → API destinations → Monitoring, check invocation metrics or use CloudWatch Logs to verify delivery attempts.What if I see “Access Denied” when creating a rule or destination?
Confirm that your IAM role includes the required actions:
events:CreateConnection, events:CreateApiDestination, events:PutRule, and events:PutTargets.
For troubleshooting guidance, refer to the official DataBee HTTP Collector documentation.

