11# terraform-aws-securityhub-summary-email
2+
23<!-- markdownlint-disable -->
4+
35[ ![ Build Status] ( https://github.com/gooygeek/terraform-aws-securityhub-summary-email/actions/workflows/terraform.yml/badge.svg )] ( https://github.com/gooygeek/terraform-aws-securityhub-summary-email/actions/workflows/terraform.yml )
46[ ![ Release] ( https://github.com/gooygeek/terraform-aws-securityhub-summary-email/actions/workflows/release.yml/badge.svg )] ( https://github.com/gooygeek/terraform-aws-securityhub-summary-email/actions/workflows/release.yml )
7+
58<!-- markdownlint-restore -->
69
710Generates and sends a periodic email summarising of Security Hub. Based on https://github.com/aws-samples/aws-security-hub-summary-email
@@ -64,23 +67,24 @@ Here is an example of using this module: [`examples/managed_sns`](https://github
6467
6568## Resources
6669
67- | Name | Type |
68- | -------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------- |
69- | [ aws_cloudwatch_event_rule.trigger] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule ) | resource |
70- | [ aws_cloudwatch_event_target.lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
71- | [ aws_iam_role.iam_for_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
72- | [ aws_lambda_permission.trigger] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
73- | [ aws_lambda_function.sechub_summariser] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
74- | [ aws_securityhub_insight.all_by_severity] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
75- | [ aws_securityhub_insight.aws_best_prac_by_severity] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
76- | [ aws_securityhub_insight.aws_best_prac_by_status] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
77- | [ aws_securityhub_insight.guardduty_by_severity] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
78- | [ aws_securityhub_insight.iam_by_severity] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
79- | [ aws_securityhub_insight.new_findings] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
80- | [ aws_securityhub_insight.top_resource_types] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
81- | [ aws_sns_topic.this] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
82- | [ aws_sns_topic_subscription.this] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
83- | [ aws_partition.this] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition ) | data source |
70+ | Name | Type |
71+ | ---------------------------------------------------------------------------------------------------------------------------------------------------- | ----------- |
72+ | [ aws_cloudwatch_event_rule.trigger] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_rule ) | resource |
73+ | [ aws_cloudwatch_event_target.lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_event_target ) | resource |
74+ | [ aws_iam_role.iam_for_lambda] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role ) | resource |
75+ | [ aws_lambda_permission.trigger] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission ) | resource |
76+ | [ aws_lambda_function.sechub_summariser] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function ) | resource |
77+ | [ aws_securityhub_insight.all_by_severity] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/securityhub_insight ) | resource |
78+ | [ aws_securityhub_insight.aws_best_prac_by_severity] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/securityhub_insight ) | resource |
79+ | [ aws_securityhub_insight.aws_best_prac_by_status] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/securityhub_insight ) | resource |
80+ | [ aws_securityhub_insight.guardduty_by_severity] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/securityhub_insight ) | resource |
81+ | [ aws_securityhub_insight.iam_by_severity] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/securityhub_insight ) | resource |
82+ | [ aws_securityhub_insight.new_findings] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/securityhub_insight ) | resource |
83+ | [ aws_securityhub_insight.top_resource_types] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/securityhub_insight ) | resource |
84+ | [ aws_sns_topic.this] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic ) | resource |
85+ | [ aws_sns_topic_subscription.this] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/sns_topic_subscription ) | resource |
86+ | [ archive_file.code] ( https://registry.terraform.io/providers/hashicorp/archive/latest/docs/data-sources/archive_file ) | data source |
87+ | [ aws_partition.this] ( https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition ) | data source |
8488
8589## Inputs
8690
@@ -95,9 +99,9 @@ Here is an example of using this module: [`examples/managed_sns`](https://github
9599
96100## Outputs
97101
98- | Name | Description |
99- | -------------------------------------------------------------- | ------------------------------ |
100- | <a name =" output_sns_topic " ></a > [ sns_topic ] ( #output_sns_topic ) | The SNS topic that was created |
102+ | Name | Description |
103+ | -------------------------------------------------------------------------- | ------ ------------------------------ |
104+ | <a name =" output_sns_topic_arn " ></a > [ sns_topic_arn ] ( #output_sns_topic_arn ) | The SNS topic's ARN that was created |
101105
102106## Test Solution
103107
0 commit comments