Disabling a control across
                standards
We recommend disabling an AWS Security Hub CSPM control across standards to maintain alignment
            throughout your organization. If you disable a control in only specific standards, you
            continue to receive findings for the control if it is enabled in other standards.
            Cross-standard disablement in multiple accounts and Regions
            To disable a security control across multiple AWS accounts and AWS Regions,
                you must use central
                    configuration.
            When you use central configuration, the delegated administrator can create Security Hub CSPM
                configuration policies that disable specified controls across enabled standards. You
                can then associate the configuration policy with specific accounts, OUs, or the
                root. A configuration policy takes effect in your home Region (also called an
                aggregation Region) and all linked Regions.
            Configuration policies offer customization. For example, you can choose to disable
                all AWS CloudTrail controls in one OU, and you can choose to disable all IAM controls in
                another OU. The level of granularity depends on your intended goals for security
                coverage in your organization. For instructions on creating a configuration policy
                that disables specified controls across standards, see Creating and associating configuration policies.
            The delegated administrator can create configuration policies to manage
                    controls in all standards except the Service-Managed Standard: AWS Control Tower. Controls for this standard should be configured
                    in the AWS Control Tower service.
If you want some accounts to configure their own controls rather than the
                delegated administrator, the delegated administrator can designate those accounts as
                self-managed. Self-managed accounts must configure controls separately in each
                Region.
         
                Cross-standard disablement in a
                        single account and Region
                If you don't use central configuration or are a self-managed account, you
                can't use configuration policies to centrally disable controls in multiple accounts
                and Regions. However, you can disable a control in a single account and
                Region.
                
                    - Security Hub CSPM console
- 
                            To disable a control across standards in one account and
                                    Region- Open the AWS Security Hub CSPM console at https://console.aws.amazon.com/securityhub/. 
- 
                                    Choose Controls from the navigation
                                        pane. 
- 
                                    Choose the option next to a control. 
- 
                                    Choose Disable Control. This option
                                    doesn't appear for a control that's already disabled. 
- 
                                    Select a reason for disabling the control, and confirm by
                                        choosing Disable. 
- 
                                    Repeat in each Region in which you want to disable the
                                        control. 
 
- Security Hub CSPM API
- 
                            To disable a control across standards in one account and
                                    Region- 
                                    Invoke the ListStandardsControlAssociations
                                        API. Provide a security control ID. Example request: {
    "SecurityControlId": "IAM.1"
}
 
- 
                                    Invoke the BatchUpdateStandardsControlAssociations
                                        API. Provide the ARN of any standards that the control is
                                        enabled in. To obtain standard ARNs, run DescribeStandards.
 
- 
                                    Set the AssociationStatusparameter equal toDISABLED. If you follow these steps for a
                                        control that's already disabled, the API returns an HTTP
                                        status code 200 response.
 Example request: {
    "StandardsControlAssociationUpdates": [{"SecurityControlId": "IAM.1", "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0", "AssociationStatus": "DISABLED", "UpdatedReason": "Not applicable to environment"}, {"SecurityControlId": "IAM.1", "StandardsArn": "arn:aws:securityhub:::standards/aws-foundational-security-best-practices/v/1.0.0", "AssociationStatus": "DISABLED", "UpdatedReason": "Not applicable to environment"}}]
}
 
- 
                                    Repeat in each Region in which you want to disable the
                                        control. 
 
- AWS CLI
- 
                            To disable a control across standards in one account and
                                    Region- 
                                    Run the list-standards-control-associations
                                        command. Provide a security control ID. aws securityhub  --region us-east-1
CloudTrail.1
 
- 
                                    Run the batch-update-standards-control-associations
                                        command. Provide the ARN of any standards that the control
                                        is enabled in. To obtain standard ARNs, run the
                                            describe-standardscommand.
 
- 
                                    Set the AssociationStatusparameter equal toDISABLED. If you follow these steps for a
                                        control that's already disabled, the command returns an HTTP
                                        status code 200 response.
 aws securityhub  --region us-east-1
'[{"SecurityControlId": "CloudTrail.1", "StandardsArn": "arn:aws:securityhub:::ruleset/cis-aws-foundations-benchmark/v/1.2.0", "AssociationStatus": "DISABLED", "UpdatedReason": "Not applicable to environment"}, {"SecurityControlId": "CloudTrail.1", "StandardsArn": "arn:aws:securityhub:::standards/cis-aws-foundations-benchmark/v/1.4.0", "AssociationStatus": "DISABLED", "UpdatedReason": "Not applicable to environment"}]'
 
- 
                                    Repeat in each Region in which you want to disable the
                                        control.