View a markdown version of this page

Enable users to start remediation of penetration test and code review findings - AWS Security Agent

Enable users to start remediation of penetration test and code review findings

In the AWS Management Console, you can enable automatic remediation so users of the AWS Security Agent web app can request fixes for a specific finding. AWS Security Agent delivers each fix as a GitHub pull request on the affected repository.

You enable remediation per repository from within an Agent Space. The Penetration test and Code review tabs open the same repository configuration wizard, so you can use either tab to manage the Automatic remediation enabled setting. Remediation applies to findings from both capabilities, so you only need to enable it once per repository.

Prerequisites

Before you begin, ensure you have:

  1. Enabled penetration testing (see Enable penetration test) or code review (see Enable code review)

  2. Installed and authorized the AWS Security Agent GitHub App for your GitHub organization (see Connect AWS Security Agent to GitHub repositories)

Open the repository configuration wizard

Choose the entry point that matches how your repositories are set up.

From the Penetration test tab

Use this path to add GitHub repositories for penetration testing and configure remediation in the same pass.

  1. Navigate to the Agent Space overview page.

  2. Choose the Penetration test tab.

  3. Select a GitHub registration that owns your repositories:

    1. If you haven’t associated any GitHub registration with the Agent Space, choose Add in the Connect GitHub to AWS Security Agent information box to select a registration.

    2. If one or more GitHub registrations are already associated, choose Add in the Connected integrations section to select another.

  4. Choose Next to choose GitHub repositories.

  5. Choose Next to configure repository capabilities.

From the Code review tab

Use this path when your repositories are already connected for code review.

  1. Navigate to the Agent Space overview page.

  2. Choose the Code review tab.

  3. In the GitHub repositories table, choose Edit to open the repository configuration wizard.

Enable automatic remediation and save

After you reach the repository capabilities step through either path above:

  1. In the Automatic remediation enabled column, mark each repository you want remediated as Enabled.

  2. Choose Connect to save the configuration.

Users of the web app can now start remediation for findings on these repositories, and AWS Security Agent will open pull requests with the proposed fixes.