Ambient Intelligence · Cybersecurity
AWS Security
Event-driven Security Hub alerting pipeline with zero-trust GitOps. Architecture → IAM → Build → Deploy → Validate.
Plan
Build
Deploy
Validate
Goal
Region
us-east-1 / us-east-2
Security alerts · ETL pipeline
Runtime
Python 3.12
Lambda + PySpark (Glue)
IaC
Terraform v1.10+
S3 native locking · no DynamoDB
Auth
GitHub OIDC
No stored AWS keys · main-branch gated
Standard
Zero-trust / Least-priv
PHI bucket denied · scoped resource ARNs
STEP 01
Plan⏱ ~1 dayComplete
Architecture Review
Event-driven AWS Security Hub alerting pipeline designed and approved. Three-module Terraform architecture: security-alerts (EventBridge → Lambda → Secrets Manager), ETL (Glue + PySpark radar merge), and deploy-role (OIDC trust). Serverless-only — no EC2, no ECS, no NAT gateways.
Pipeline Checklist
Complete76%
Open Decisions
◇Multi-channel alerting — current: Google Chat only. PagerDuty/OpsGenie integration for on-call escalation not yet wired; SNS fan-out would enable multiple destinations.
◇Multi-region finding aggregation — EventBridge rules are per-region. If Security Hub multi-region aggregation is enabled, a single rule in the aggregation region may be sufficient.
◇Glue job scheduling — currently triggered manually or ad hoc. EventBridge schedule (e.g., nightly) not yet configured for radar-timeline-merge.
◇CRITICAL vs HIGH severity routing — current: both routed identically. Separate Lambda or SNS topic for CRITICAL-only escalation (pager, SMS) not yet implemented.