DEV Community

Asanka Boteju
Asanka Boteju

Posted on

1

Vulnerability Management at Scale With Amazon Inspector

Amazon Inspector for automated and continues vulnerability management at scale. This includes things like Software vulnerabilities as well as unintended network exposure to outside world.

Amazon Inspector automates security scans and assessments for your applications for Software vulnerabilities (such as operating system and all installed applications) and unintended network exposure and deviations from best practices. Amazon Inspector can be enabled at AWS Organization level for multi-account management and implement automated discovery and continues scanning. This service provides you near real time findings with a inspector score denoting the severity level along with steps for remediation of the findings. Amazon Inspector can scan EC2 instances, ECR Images (Elastic Container Registry) and even Lambda functions.

The findings can be inspected via the Amazon Inspector Dashboard, integrated with other AWS services like AWS Security Hub, Amazon Event Bridge to create security workflows to apply remediation and for issue resolution.

Image description

In Amazon Inspector, a finding is a detailed report about a vulnerability that affects one of your AWS resources. Amazon Inspector generates a finding whenever it detects a vulnerability in your AWS resources. Each finding has the name of the detected vulnerability and provides a severity rating, information about the affected resource, and details such as how to remediate the reported vulnerability.

Amazon Inspector continually scans your compute environment and stores your active findings until it detects that they are remediated. A remediated finding is automatically detected and closed, and then deleted after 30 days. A finding is assigned one of the following states:

Active
The finding is identified by Amazon Inspector and has not been remediated. Active findings are subject to suppression rules and, if applicable, the status is changed to Suppressed.

Suppressed
The finding meets one or more criteria of one or more suppression rules. Suppressed findings are hidden from most views, except for the Suppressed findings list.

Closed
After a vulnerability is remediated, Amazon Inspector automatically detects it and changes the state of the finding to closed. Closed findings are deleted after 30 days if there are no other changes.

With that we have come to the end of this article.

Thank you for your time...

Image of Timescale

Timescale – the developer's data platform for modern apps, built on PostgreSQL

Timescale Cloud is PostgreSQL optimized for speed, scale, and performance. Over 3 million IoT, AI, crypto, and dev tool apps are powered by Timescale. Try it free today! No credit card required.

Try free

Top comments (0)

A Workflow Copilot. Tailored to You.

Pieces.app image

Our desktop app, with its intelligent copilot, streamlines coding by generating snippets, extracting code from screenshots, and accelerating problem-solving.

Read the docs

👋 Kindness is contagious

Engage with a sea of insights in this enlightening article, highly esteemed within the encouraging DEV Community. Programmers of every skill level are invited to participate and enrich our shared knowledge.

A simple "thank you" can uplift someone's spirits. Express your appreciation in the comments section!

On DEV, sharing knowledge smooths our journey and strengthens our community bonds. Found this useful? A brief thank you to the author can mean a lot.

Okay