AWS - Security - AWS Inspector (EC2)
[toc]
AWS Inspector what’s wrong > vulnerabilities for EC2
- automated security assessment service
assesses applications for exposure, vulnerabilities, and deviations from best practices
- analyze the behavior of the resources and identify potential security issues
- Analyzes the VPC encironment for potential security issuse.
- identify EC2 instances for common security vulnerabilities.
- asses EC2s for vulnerabilities or deviations from best practices.
helps improve the security and compliance of applications deployed on AWS.
- Inspector uses a defined template and assesses the environment.
- Providees the findings and recommends steps to resolve any potential security issues found.
- define a collection of resources to include in the assessment target
- then create an assessment template to launch a security assessment run of that target.
- analyze EC2 instances against pre-defined security templates
to check for vulnerabilities
- Results is a detailed list of the security findings/issues prioritized by level of severity!
- The name of the assessment target, which includes the EC2 instance where this finding was registered
- The name of the assessment template that was used to produce this finding
- The assessment run start time, end time, and status
- The name of the rules package that includes the rule that triggered this finding
- The name of the finding
- The severity level of severity of the finding
- The description of the finding
- prioritized steps for remediation
- findings can be reviewed directly or as part of detailed assessment reports which are available via the Amazon Inspector console or API.
- Amazon Inspector includes a knowledge base with hundreds of rules
- Use rules packages to evaluate an application
- mapped to common security compliance standards and vulnerability definitions
- whether remote root login is enabled
- whether vulnerable software versions are installed.
- check for unintended network accessibility and vulnerabilities on EC2 instances.
- These rules are regularly updated by AWS security researchers
This post is licensed under CC BY 4.0 by the author.
Comments powered by Disqus.