Which AWS automated vulnerability management service continuously scans workloads for software vulnerabilities and unintended network exposure?
Amazon Inspector
This deck covers Amazon Inspector Classic
Which AWS services does Amazon Inspector assess for vulnerabilities and deviations from security best practices?
How frequently can Amazon Inspector run vulnerability scans?
Scans can run as often as:
- 15 minutes
- 1 hour
- 1 day
What does Amazon Inspector produce after a scan completes?
A prioritized findings report, ordered by severity
What two assessment types does Amazon Inspector provide?
Which Amazon Inspector assessment type analyzes network configurations for unintentional exposure to the internet?
Network assessment
Which Amazon Inspector assessment type analyzes EC2 instances and container images for software vulnerabilities and configuration issues?
Host assessments
What collection of security rules does Amazon Inspector use to assess a security posture?
Rules packages
Which Amazon Inspector rules package analyzes end-to-end network reachability across EC2, ALB, Direct Connect, ELB, ENIs, Internet Gateway, NACLs, route tables, security groups, subnets, VPCs, VGWs, and VPC peering?
Network Reachability Rules Package
What findings can the Network Reachability Rules Package return?
Which Amazon Inspector rules packages require an agent?
Host rules packages:
- Common Vulnerabilities and Exposures (CVE)
- Center for Internet Security (CIS) Benchmark
- Security Best Practices for Amazon Inspector
What types of container image scanning does Amazon Inspector support?
What does Amazon Inspector Enhanced Scanning provide?
Continuous scanning of container images for OS and programming language vulnerabilities, and event generation when new vulnerabilities are detected
How does Amazon Inspector Basic Scanning work?
Performs scans on image push or manual trigger using the Common Vulnerabilities and Exposures (CVE) database from the open-source Clair project
What types of vulnerabilities are detected by Amazon Inspector Enhanced Scanning?
Operating system and programming language package vulnerabilities