Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/epomatti/aws-inspector
Amazon Inspector vulnerability management
https://github.com/epomatti/aws-inspector
aws aws-inspector aws-security ec2 ecr lambda ssm systems-manager terraform
Last synced: about 2 months ago
JSON representation
Amazon Inspector vulnerability management
- Host: GitHub
- URL: https://github.com/epomatti/aws-inspector
- Owner: epomatti
- License: mit
- Created: 2023-09-02T18:21:39.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-09-23T23:19:14.000Z (over 1 year ago)
- Last Synced: 2023-09-24T05:45:50.346Z (over 1 year ago)
- Topics: aws, aws-inspector, aws-security, ec2, ecr, lambda, ssm, systems-manager, terraform
- Language: HCL
- Homepage:
- Size: 130 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# AWS Inspector
Amazon Inspector vulnerability scan.
👉 Before you start, set up these services manually:
- Use the Console to enable **Inspector**.
- **Fleet Manager** to managed EC2 instances, `Default Host Management` is enough for testing.Create the test resources:
```sh
terraform init
terraform apply -auto-approve
```The configuration will create the following resources:
- **Lambda**
- **ECR**
- **EC2**To scan an ECR image, upload one if none is available:
```sh
bash ecrBuildPush.bash
```If all goes well, coverage should be 100% for all environments created by this config:
The EC2 instance should be found by the Fleet Manager:
For ECR, vulnerabilities should be shown on Inspector as well: