OpsCanary
Back to daily brief
awssecurity hubPractitioner

Mastering Findings in Security Hub CSPM: Creation and Updates

5 min read AWS DocsApr 23, 2026
PractitionerHands-on experience recommended

Security Hub CSPM exists to streamline the management of security findings across your AWS environment. It aggregates and normalizes findings from various sources into a standardized format known as the AWS Security Finding Format (ASFF). This ensures that you have a consistent view of security checks and detections, which is essential for effective monitoring and response.

When you create or update findings, Security Hub CSPM automatically handles the normalization process. If you enable cross-Region aggregation, it will also gather new and updated findings from all linked Regions into a specified aggregation Region. Active findings are retained for 90 days, while archived findings last for 30 days. If an active finding isn't updated within 90 days, it expires and is permanently deleted. Similarly, archived findings expire after 30 days of inactivity. The expiration for control findings is determined by the UpdatedAt field, whereas other types rely on both the ProcessedAt and UpdatedAt fields.

In practice, using the BatchUpdateFindings and BatchImportFindings functions allows you to efficiently manage your findings. Be aware that findings can transition between active and archived states, which impacts how long you can rely on them for compliance and security assessments. The lifecycle management of findings is crucial; understanding when they expire can help you avoid missing critical alerts. Keep an eye on the RecordState as it dictates your findings' visibility and relevance in your security strategy.

Key takeaways

  • Understand the lifecycle of findings: active findings last 90 days, archived findings 30 days.
  • Utilize the AWS Security Finding Format (ASFF) for consistent security data management.
  • Leverage BatchUpdateFindings for efficient updates to multiple findings at once.
  • Monitor the RecordState to manage the visibility of your findings effectively.

Why it matters

In production, effectively managing security findings is vital for compliance and rapid incident response. A clear understanding of how findings are created, updated, and expire can significantly enhance your security posture and reduce the risk of overlooking critical vulnerabilities.

Code examples

plaintext
BatchUpdateFindings
plaintext
RecordState
plaintext
BatchImportFindings

When NOT to use this

The official docs don't call out specific anti-patterns here. Use your judgment based on your scale and requirements.

Want the complete reference?

Read official docs

Test what you just learned

Quiz questions written from this article

Take the quiz →

Get the daily digest

One email. 5 articles. Every morning.

No spam. Unsubscribe anytime.