eCloudtureeCloudture
  • Training
    • Cloud Map
    • Cloud Training
    • Cloud Certification
  • Career
    • 2023 Internship Program
    • University Cloud Seeding Program
  • Resource
    • Blog
    • Examinations Center
    • Venue Rental
  • eCloudture
    • About eCloudture
    • Sharing Story
    • Contact
  • chinese
    • Training
      • Cloud Map
      • Cloud Training
      • Cloud Certification
    • Career
      • 2023 Internship Program
      • University Cloud Seeding Program
    • Resource
      • Blog
      • Examinations Center
      • Venue Rental
    • eCloudture
      • About eCloudture
      • Sharing Story
      • Contact
    • chinese
    • Home
    • All Post
    • AWS Inspector

    AWS Inspector

    • Posted by Shelly Yu
    • Categories All Post, Security
    • Date 08/08/2019
    • Comments 0 comment

    Overview

    AWS Inspector is a security assessment tool does a wide variety of security assessment tests on the IT resources and generate detailed reports on it. It automatically assesses applications for exposure, vulnerabilities, and deviations from best practice. After performing an assessment, AWS Inspector produces a detailed list of security findings prioritized by level of severity. These findings can be viewed directly or as part of detailed assessment reports which are available via Amazon Inspector console or API.

    Most of these tools have capability of prioritizing vulnerabilities based on the severity. This is the indication for an IT administrator to patch the software. AWS Inspector security assessments not only help you check for unintended network accessibility of your own Amazon EC2 instances and for vulnerabilities on those EC2 instances but also offered to you as pre-defined rules packages mapped to common security best practices and vulnerability definitions. Examples of built-in rules include checking for access to your EC2 instances from the Internet, remote root login being enabled, or vulnerable software versions installed.

    With Amazon Inspector, you can automate security vulnerability assessments throughout your development and deployment pipelines or for static production systems in order to make security testing a regular part of development and IT operations.

    Scenario

    In this lab, you will install the Agent on a Linux-based EC2 Instance and evaluate your instance using AWS Inspector.

    Step by Step

    Prepare your agent

    Install Inspector agent on your EC2 instance in order to let your AWS Inspector examine your EC2 instance.

    1. Log in your instance.

    2. download the agent to your instance.

      wget https://inspector-agent.amazonaws.com/linux/latest/install

    3. install

      sudo bash install

    4. run

      sudo /etc/init.d/awsagent start

    5. check the status

      sudo /opt/aws/awsagent/bin/awsagent status

    Prepare your Tags

    With these tags, AWS Inspector can find your instance easily.

    1. On the service menu, select EC2, on the left panel, click instance.

    2. Click tags and Add/Edit Tags.

    1. Click Create Tag.

    2. Input value and save.

      • key : App
      • value : awsinspector

    Create your inspector

    Create your AWS Inspector to examine your EC2 whether there is network exposure, network reachability, security best practice, common vulnerabilities and exposures, enter for Internet security (CIS) benchmarks, runtime Behavior Analysisor or not.

    1. Click get started and advanced setup.

    1. Enter Name with yourname-target.

      • Unclick include all EC2 instances in this AWS account and region.

      • Key : select App

      • Value : select awsinspect

    <

    1. Enter name : yourname-template.

    2. Click next and create.

    3. make sure your status is collecting data.

    1. Wait for an hour.

    Furthermore

    Severity Levels for Rules in Amazon Inspector It can also help you determine your response when a rule highlights a potential problem. High, Medium, and Low levels all indicate a security issue that can result in compromised information confidentiality, integrity, and availability within your assessment target.

    • High : treat this security issue as an emergency and implement an immediate remediation.
    • Medium : fix this issue at the next possible opportunity, for example, during your next service update.
    • Low : fix this issue as part of one of your future service updates.
    • Informational : Describes a particular security configuration detail of your assessment target. Based on your business and organization goals, you can either simply make note of this information or use it to improve the security of your assessment target.

    Amazon Inspector Rules Packages

    Network assessments: * Network Reachability

    Host assessments: * Common Vulnerabilities and Exposures * Center for Internet Security (CIS) Benchmarks * Security Best Practices for Amazon Inspector * Runtime Behavior Analysis

    Conclusion

    Now you’ve inspect your instance using AWS inspector and it create reports for your instance.

    AWS inspector can also be used in other scenarios. Though AWS doesn’t guarantee that following the provided recommendations will resolve every potential security issue, it provide you some suggestion about your instance.

    Refence

    • Amazon Inspector: here

    • Amazon Inspector Document: here

    Tag:AWS, AWS Inspector, Ec2

    • Share:
    Shelly Yu

    Previous post

    AWS Serverless Application Model
    08/08/2019

    Next post

    Use EC2 to Build Windows Active Directory
    08/08/2019

    You may also like

    reInvent_facebook_post_werner_Eng
    AWS re:Invent 2021 – Werner Vogels Keynote
    6 December, 2021
    reInvent-Adam-Eng_工作區域 1
    AWS re:Invent 2021 – Adam Selipsky Keynote
    1 December, 2021
    shutterstock_134102588
    AutoScaling – Health check v.s. Status Check
    25 November, 2021

    Leave A Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    搜尋文章

    Categories

    • AI/ML
    • All Post
    • AWS re:Invent
    • Big Data
    • Container
    • Foundation
    • News
    • Security
    • Serverless
    Phone : +886 2 22801777
    Mail : info@ecloudture.com

    Training

    • Cloud Training
    • Cloud Map
    • Cloud Certification

    Talent

    • University Cloud Seeding Program

    Resource

    • Blog
    • Examinations Center
    • Venue Rental

    eCloudture

    • About eCloudture
    • Sharing Story
    • Contact

    • Privacy
    • Terms
    • Sitemap