CSPM in AWS: A Step-by-Step Guide to Secure Cloud Environments

Wiz Experts Team
CSPM in AWS main takeaways:
  • CSPM automates continuous scanning, detection, and resolution of vulnerabilities and misconfigurations across diverse cloud infrastructures.

  • AWS Security Hub centralizes CSPM by aggregating findings from native security services and third-party tools for unified visibility across your environment.

  • Agentless CSPM scans deploy in minutes, enabling immediate security coverage across storage, compute, and IAM without the overhead of agent installation.

  • Risk-based prioritization reduces alert fatigue by providing context on which vulnerabilities impact AWS workloads most.

What is cloud security posture management in AWS, and why does it matter?

Figure 1: AWS security across the shared responsibility model

Cloud security posture management (CSPM) automates security risk monitoring, identification, and mitigation across cloud environments. CSPM practices help customers manage their part of the shared responsibility model using tools that enable continuous monitoring and improvement of application and data security.

CSPM in AWS maintains a secure cloud environment by providing visibility into security gaps, compliance violations, and potential attack paths before incidents escalate. The AWS shared responsibility model divides security duties: AWS protects underlying infrastructure, while you secure data, applications, and configurations. This division of labor makes CSPM essential, as minor misconfigurations in AWS accounts can expose sensitive data and create vulnerabilities.

Agentless Full Stack coverage of your AWS Workloads in minutes

Learn why CISOs at the fastest growing companies choose Wiz to help secure their AWS environments.

For information about how Wiz handles your personal data, please see our Privacy Policy.

What are common misconfigurations in AWS environments?

Recognizing common misconfigurations highlights where CSPM tools add the most value. These errors fall into three main categories: storage, compute, and identity and access management (IAM), each carrying distinct risks that CSPM AWS solutions monitor and remediate. 

Here’s an overview of the three misconfiguration types:

Storage misconfigurations

Amazon S3 offers scalable storage, but managing security is critical as data volumes grow. In 2022, researchers discovered that logistics provider D.W. Morgan exposed 3TB of sensitive client employee data because of an S3 misconfiguration, including records dating back to 2018. This breach illustrates how minor S3 errors can cause massive damage. 

Monitor and remediate these common S3 misconfigurations:

  • Public bucket access: Incorrect bucket policies or access control lists (ACLs) can accidentally expose private buckets. CSPM tools continuously scan for publicly accessible buckets and alert security teams to potential exposures.

  • Unencrypted data storage: Improperly configured encryption compromises data at rest. CSPM solutions verify encryption settings across all S3 buckets and flag unencrypted storage.

  • Disabled access logging: AWS disables S3 access logging by default. Enabling logging helps detect and trace malicious activity, while CSPM workflows automate verification to keep logging active across your AWS environment.

  • Disabled versioning: Enable S3 versioning to protect data from accidental deletion. CSPM platforms check versioning status to ensure recovery options exist.

  • Disabled object lock: S3 object lock prevents data deletion via write once, read many (WORM) mode. CSPM solutions validate object locks for buckets containing critical or regulated data.

  • Faulty bucket policies and ACLs: Improper permissions allow unauthorized access, data breaches, or data losses. Disabling ACLs allows owners to regulate access through IAM policies, which CSPM tools continuously audit to flag overly permissive configurations.

Pro tip

💡Pro tip: Storing accumulated logs in a target bucket increases costs. Manage storage expenses by implementing a log deletion mechanism while maintaining sufficient audit history.

Compute misconfigurations

AWS compute services like EC2, Lambda, and Elastic Load Balancing are popular targets for attackers. 

Monitor and remediate these common compute errors:

  • Improper IAM role configurations: Overly permissive roles and misconfigured policies grant instances excessive privileges. In 2019, an attacker exploited misconfigured firewall settings and a permissive IAM role to breach 100 million Capital One records. Use CSPM tools to analyze IAM permissions to enforce the principle of least privilege.

  • Public, shared, or unencrypted snapshots: Accidental public sharing of EC2 snapshots creates massive data risks. CSPM solutions scan for exposed snapshots and alert teams to remediate vulnerabilities before attackers discover them.

  • Default EC2 key pairs: Shared or default key pairs permit unauthorized SSH access. CSPM AWS implementations verify that unique, properly managed key pairs secure each environment.

  • Public or unencrypted Amazon Machine Images (AMIs): Inadvertently setting AMIs to public exposes sensitive data. Automated CSPM checks identify these risks and trigger remediation workflows.

Figure 2: Capital One data breach (Adapted from the journal “ACM Transactions on Privacy and Security”)

Identity and access management misconfigurations

IAM involves properly managing users, groups, and roles while defining policies for AWS service permissions. 

Monitor and remediate common IAM vulnerabilities:

  • Excessive permissions: Attackers breaching an account with broad permissions cause far greater damage. Applying the principle of least privilege is essential, as CSPM solutions continuously monitor IAM permissions and identify and restrict accounts with excessive access.

  • Unused or stale credentials: Credentials that are no longer in use, such as access keys for former employees or deprecated roles, pose security risks. Decommissioning them immediately using CSPM tools flags inactive credentials for review and removal.

  • Permissions that don’t use roles: Attaching policies to users instead of roles creates hard-to-manage permission setups. CSPM platforms detect these anti-patterns and recommend role-based access control.

  • Absence of multi-factor authentication (MFA): Skipping MFA for speed or oversight creates significant risk. Enforcing MFA for all users via IAM policies prevents unauthorized access, while CSPM solutions audit compliance across AWS environments.

Mitigating IAM misconfigurations with AWS IAM Access Analyzer

AWS IAM Access Analyzer identifies and reduces unintended external access to AWS resources. Analyzing permission policies detects resources like S3 buckets, IAM roles, and KMS keys shared outside your AWS account and flags them for review. Key features include:

FeatureDescription
Identifying unintended accessIAM Access Analyzer scans resource policies and highlights configurations granting external access for quick remediation. Scanning is central for effective CSPM in AWS.
Proactive policy validationValidate new or existing policies before you apply them with IAM Access Analyzer to ensure they conform to security best practices. Proactive checks prevent overly permissive access.
Insights for cleanupThe analyzer highlights inactive roles and unused permissions to help you clean up stale configurations. Actionable insights align your environment with the principle of least privilege.

Example use case for AWS IAM Access Analyzer

If you unintentionally share an S3 bucket with the public or external accounts, IAM Access Analyzer detects the issue and provides recommendations for policy changes. The analyzer might suggest removing “Allow” statements for public access in the bucket policy or replacing them with explicit user permissions.

Threat actors often exploit these misconfigurations to breach AWS environments, but these aren’t the only vulnerabilities that require attention. Network settings and serverless function configurations also demand careful monitoring and adherence to best practices for a secure AWS environment.

How does AWS Security Hub enable CSPM for CloudSec, AppSec, and SecOps teams?

AWS Security Hub prevents data fragmentation by aggregating, organizing, and prioritizing security findings across your AWS environment. The platform integrates with essential AWS security services, including AWS Config for configuration tracking, Amazon GuardDuty for threat detection, AWS IAM Access Analyzer for access reviews, and Amazon Inspector for vulnerability assessment. Aggregating these findings allows CloudSec managers to gain a unified view of security risks without monitoring multiple dashboards.

Security Hub acts as the nerve center for your AWS CSPM strategy. Consolidating findings into a single interface allows security teams to assess cloud security posture, track compliance status, and coordinate remediation efforts across distributed teams.

For AppSec and SecOps teams, Security Hub provides automated compliance checks against industry standards like CIS AWS Foundations Benchmark, PCI DSS, and AWS Foundational Security Best Practices. Continuous assessments replace manual audit processes and provide real-time compliance scores that demonstrate security posture to leadership and auditors.

Security Hub serves as the central orchestration platform for CSPM in AWS by connecting native AWS security services to CSPM tools and cloud-native application protection platforms like Wiz to provide comprehensive visibility. Wiz feeds findings into Security Hub to enrich the platform’s visibility with agentless scanning, contextual risk prioritization, and cross-cloud insights. Combining these resources allows organizations to leverage both AWS-native security services and specialized CSPM tools through a single pane of glass.

Key features of AWS Security Hub for CSPM

AWS Security Hub offers several essential features for managing your cloud security posture:

  • Centralized findings management: Security Hub aggregates security findings from AWS services and supported third-party products into a standardized format called AWS Security Finding Format (ASFF). Standardizing findings allows security teams to process, filter, and respond to findings consistently regardless of their source.

  • Automated security checks: The platform continuously runs automated security checks across your AWS accounts and resources. Ongoing evaluations analyze configurations against security standards and generate findings when the system detects misconfigurations. Automation also reduces manual security assessment workloads for SecOps teams.

  • Compliance dashboards: Built-in compliance dashboards display your security score across enabled standards. Dynamic views help you quickly identify which controls are passing or failing, understand your overall compliance percentage, and drill down into specific findings affecting compliance status. Visibility helps CloudSec leaders communicate security posture to executives and demonstrate regulatory compliance.

  • Custom insights and filters: Security Hub lets you create custom insights that group and track findings by criteria relevant to your organization. Specific insights can track all critical findings in production accounts or monitor specific resource types for common misconfigurations.

  • Integration with AWS services: Connecting with Amazon EventBridge enables automated remediation workflows. For instance, when Security Hub generates a finding, EventBridge can trigger AWS Lambda functions that automatically remediate common misconfigurations or create tickets in your incident management system.

  • Multi-account and multi-region support: For organizations with multiple AWS accounts, Security Hub aggregates data across accounts via AWS Organizations integration. Aggregation is essential for enterprises managing complex AWS environments across different business units or geographic regions.

Setting up and configuring CSPM in AWS: A step-by-step guide

Implementing CSPM in AWS requires a methodical configuration of Security Hub and integration of supporting security services. This step-by-step guide provides actionable instructions for SecOps teams to follow to establish a baseline CSPM coverage:

1. Enabling AWS Security Hub and integrating accounts

Enable Security Hub in a dedicated security operations account to act as your central hub. Designating this account as the delegated administrator allows you to manage security posture across your entire organization.

  • Log in to the AWS Management Console and navigate to AWS Security Hub.

  • Click “Go to Security Hub,” review the service permissions, and select “Enable Security Hub.”

  • Select the security standards relevant to your environment and region. The AWS Foundational Security Best Practices and CIS AWS Foundations Benchmark provide a strong baseline.

  • Confirm your selections to complete the setup.

💡Pro tip: Configure Security Hub to aggregate findings across all AWS accounts via AWS Organizations to streamline multi-account environments.

2. Configuring security standards and automated checks

After enabling Security Hub, configure the security standards and controls that apply to your environment. Customizing these settings ensures automated checks align with organizational security requirements and compliance obligations.

  • Navigate to Security Hub and open the configuration areas for security standards and controls.

  • Review the enabled standards, such as AWS Foundational Security Best Practices, CIS AWS Foundations Benchmark, and PCI DSS.

  • Review individual controls for each standard and deactivate those that don’t apply to your environment. 

  • Configure suppression rules or use filters for accepted risks or known false positives to help teams focus on actionable issues.

Security Hub continuously evaluates AWS resources against enabled security standards and generates findings when it detects misconfigurations or noncompliant configurations. Integrating additional AWS security services further enhances these CSPM capabilities.

3. Managing findings and remediation workflows

Establish clear processes for managing findings and executing remediation workflows. Applying a structured triage model transforms alerts into actionable security wins.

  • Prioritize findings by severity using the labels Security Hub assigns—Critical, High, Medium, Low, or Informational—to every finding. Directing the team’s attention to Critical and High-severity findings first ensures you address the greatest security risks mapping to high-priority controls or compliance gaps.

  • Configure automated remediation using Amazon EventBridge to create rules that react to specific Security Hub findings and trigger automated actions. Automating responses reduces manual effort and response times. 

Combining prioritized triage, clear ownership, and automated remediation workflows turns Security Hub into a central system of record and response for misconfigurations and threats across your AWS environment.

CSPM AWS architecture and implementation

Architecture for CSPM in AWS creates a comprehensive cloud security model linking native AWS services with third-party platforms to enhance coverage.

Security workflows begin with data collection and monitoring from AWS security services, including AWS Config, Amazon GuardDuty, AWS IAM Access Analyzer, and Amazon Inspector. Native tools continuously scan your AWS environment for configuration changes, threats, access anomalies, and vulnerabilities.

AWS Security Hub sits at the core of the CSPM AWS architecture to aggregate and normalize findings from native AWS services and supported third-party solutions. Standardizing data simplifies security analysis and compliance across your entire AWS environment.

Platforms like Wiz extend these capabilities with agentless scanning to catch risks while identifying misconfigurations and vulnerabilities that AWS-native tools miss, particularly in hybrid or complex multi-cloud architectures or applications.

Receiving findings triggers evaluations against security standards to generate compliance scores viewable on the Security Hub console, custom dashboards, or integrated SIEM platforms.

Automated remediation workflows leverage Amazon EventBridge to trigger AWS Lambda functions executing pre-defined remediation scripts or route tickets for actions requiring human intervention to appropriate teams.

Breaking down a security incident with AWS’ CSPM architecture

AWS CSPM enables an automated rapid response to security incidents by using integrated services to detect, investigate, and remediate threats. The following walkthrough demonstrates the workflow from detection to long-term analysis:

  • Detection phase: Amazon GuardDuty detects unusual API activity in an AWS account, such as attempts to disable logging or access sensitive S3 buckets from an unfamiliar IP address. GuardDuty then generates a finding for AWS Security Hub.

  • Aggregation and prioritization: Security Hub receives the GuardDuty finding and normalizes the data into ASFF. Standardizing findings allows the platform to assign severity levels based on potential impact and correlate data with other recent security events.

  • Investigation: AWS Detective automatically collects and analyzes data related to the suspicious activity, including AWS CloudTrail logs, VPC Flow Logs, and GuardDuty findings. Security analysts use Detective to visualize the event timeline, understand incident scope, and identify affected resources.

  • Automated response: EventBridge receives the Security Hub finding to trigger a pre-defined response workflow. An AWS Lambda function executes during this process to isolate the compromised EC2 instance by modifying security groups and revoking active sessions associated with compromised credentials.

  • Manual remediation coordination: Actions requiring human judgment trigger EventBridge to create a ticket in the incident management system. Tickets include context from Security Hub, investigation details from Detective, and recommended remediation steps.

  • Compliance and audit trail: AWS CloudTrail logs all API calls and changes to AWS resources throughout the incident. AWS Config tracks configuration changes, while AWS Audit Manager automatically collects evidence to demonstrate security incident response processes during audits.

  • Long-term analysis: Security teams store logs and findings in Amazon S3 for long-term retention using AWS Lake Formation to organize data. Teams also use Amazon QuickSight to visualize incident trends, identify systemic weaknesses, and measure the effectiveness of security controls.

  • Notification and escalation: Amazon CloudWatch and AWS SNS ensure security teams receive real-time alerts through preferred channels (e.g., email, SMS, Slack, or PagerDuty). Alert routing rules also escalate unresolved critical findings to senior security leadership.

Integrated architecture enables CSPM in AWS to transform security services into a coordinated defense system that detects threats, responds automatically to common issues, and provides security teams with the context they need to address complex incidents effectively.

Best practices for effective CSPM in AWS environments

Operational excellence in CSPM AWS requires continuous refinement of your security monitoring and remediation processes. Applying these best practices enables CloudSec and SecOps teams to maximize CSPM implementation value while reducing alert fatigue and operational overhead:

Best practiceDescriptionAction step
Implement tagging strategies for resource classificationTagging AWS resources improves organization, cost allocation, and security enforcement.Use tags for environment, data classification, and compliance needs to help CSPM tools prioritize findings by business impact.
Enable automated remediation for low-risk, high-frequency findingsAutomation reduces manual effort and speeds up remediation time.Identify frequent, low-risk findings, like enabling S3 bucket logging or encrypting EBS volumes, to automate remediation.
Establish risk-based finding prioritizationPrioritize high-severity, high-impact issues first because not every finding demands urgent action.Use a scoring system that factors in severity, exploitability, asset importance, and controls.
Align CSPM scans with deployment cyclesBalancing monitoring with performance and costs ensures efficient operations.Run intensive scans during low-activity times and increase scan frequency post-deployment to detect misconfigurations quickly.
Create custom security standards for your organizationAdding custom standards via Security Hub for internal policies ensures that checks match your specific compliance and risk needs.Use Security Hub for internal policies.
Implement exception management processesDocumenting accepted risks avoids overwhelming teams with non-remediable issues.Set up a process to document accepted risks, review exceptions periodically, and track controls.
Integrate CSPM findings into developer workflowsFixing security issues early with developer feedback prevents production misconfigurations.Embed findings in CI/CD, IaC validation, and pull requests.
Monitor CSPM tool performance and coverageTracking metrics like coverage percent, resolution time, and false positives helps identify gaps and refine the setup.Audit CSPM regularly to confirm full scanning of accounts, regions, and resources.
Coordinate CSPM with cloud cost optimizationSecurity misconfigurations often signal cost waste, like unused public resources.Align security and FinOps teams to fix risks and inefficiencies.
Establish cross-functional remediation ownershipSpreading security responsibility organization-wide ensures app and infra teams fix the issues they own.Route findings by type to defined owners, set severity-based SLAs, and grant necessary permissions and tools.

How Wiz enhances your AWS CSPM strategy

AWS Security Hub provides robust native CSPM capabilities, and Wiz complements these native features with agentless scanning to address gaps enterprise security teams encounter in complex cloud environments. Deploying in minutes without agent installation provides immediate, comprehensive visibility across all AWS accounts.

Analyzing relationships among cloud resources, access paths, and security findings enables the Wiz Security Graph to identify issues that pose genuine business risk. Contextual prioritization reduces alert fatigue and helps teams focus on critical vulnerabilities. Key capabilities include integration with AWS Security Hub for centralized management, cross-cloud visibility across multi-cloud environments, and toxic combination detection that identifies compound risks traditional tools miss.

Organizations that want to optimize their AWS CSPM strategy beyond native services leverage Wiz for the contextual intelligence and comprehensive coverage modern security teams require. Get a free AWS security assessment today to uncover critical misconfigurations, benchmark your CSPM posture, and prioritize high-impact fixes across your environment.

Agentless Full Stack coverage of your AWS Workloads in minutes

Learn why CISOs at the fastest growing companies choose Wiz to help secure their AWS environments.

For information about how Wiz handles your personal data, please see our Privacy Policy.

FAQ about CSPM in AWS