{"id":37582,"date":"2016-07-28T00:20:45","date_gmt":"2016-07-27T18:50:45","guid":{"rendered":"http:\/\/www.tothenew.com\/blog\/?p=37582"},"modified":"2016-12-19T15:04:00","modified_gmt":"2016-12-19T09:34:00","slug":"introduction-to-aws-inspector","status":"publish","type":"post","link":"https:\/\/www.tothenew.com\/blog\/introduction-to-aws-inspector\/","title":{"rendered":"Introduction to AWS Inspector"},"content":{"rendered":"<p align=\"left\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-37792 aligncenter\" src=\"\/blog\/wp-ttn-blog\/uploads\/2016\/07\/Screenshot-from-2016-07-21-125548.png\" alt=\"Screenshot from 2016-07-21 12:55:48\" width=\"575\" height=\"170\" \/><\/p>\n<p><strong>AWS Inspector<\/strong> is an automated security assessment service which helps to improve the security and compliance of applications <a title=\"AWS DevOps\" href=\"http:\/\/www.tothenew.com\/devops-aws\">deployed on AWS EC2<\/a> by identifying potential security issues, vulnerabilities, or deviations from security standards.<\/p>\n<p>Using Amazon Inspector, one can easily automate security testing across development, test, and production environments, identifying security vulnerabilities as a part of the entire software development, deployment, and operations lifecycle.<\/p>\n<p>It works by first defining a target set of resources using tags, then configuring an assessment template that defines what we\u2019re looking for (common vulnerabilities and exploits (CVEs), PCI requirements, etc.) and runs an assessment against our target resources, thereby examining the findings and mitigating the issues found.<\/p>\n<h2 style=\"text-align: center;\"><span style=\"text-decoration: underline;\"><strong>Setting up Amazon Inspector<\/strong><\/span><\/h2>\n<p>In order to\u00a0assess the security of the EC2 instances that make up our Amazon Inspector assessment targets, we must install the AWS agent on each instance first. To do so, first download the agent script by running either of the commands:<\/p>\n<ul>\n<li class=\"listitem\"><strong><span class=\"command\">wget https:\/\/d1wk0tztpsntt1.cloudfront.net\/linux\/latest\/install<\/span><\/strong><\/li>\n<li class=\"listitem\"><span class=\"command\"><strong>curl -O <\/strong>l<\/span><\/li>\n<\/ul>\n<p>To install the agent, run <span class=\"command\"><strong>sudo bash install<\/strong><\/span>.<br \/>\nThis will successfully install AWS agent on your EC2 instance.<\/p>\n<p>Now, follow the following steps in order to setup Amazon inspector on your EC2 instance:<\/p>\n<ol>\n<li>Sign into the AWS Management Console and open the Amazon Inspector.<\/li>\n<li>On prerequisites page, click on <strong>Choose or Create role:<\/strong><img decoding=\"async\" loading=\"lazy\" class=\"alignnone  wp-image-37803\" src=\"\/blog\/wp-ttn-blog\/uploads\/2016\/07\/Screenshot-from-2016-07-21-131055.png\" alt=\"Screenshot from 2016-07-21 13:10:55\" width=\"632\" height=\"307\" \/><\/li>\n<li>A new window will pop up specifying the new IAM role created. Click <strong>allow:<\/strong><img decoding=\"async\" loading=\"lazy\" class=\"alignnone  wp-image-37808\" src=\"\/blog\/wp-ttn-blog\/uploads\/2016\/07\/Screenshot-from-2016-07-21-135407.png\" alt=\"Screenshot from 2016-07-21 13:54:07\" width=\"632\" height=\"303\" \/><\/li>\n<li>Click <strong>Next<\/strong>.<\/li>\n<li>On <strong>Define an assessment target<\/strong> page, specify the name of the assessment target.<br \/>\nIn Tags field, select <strong>Key<\/strong> as <strong>Name<\/strong> and value as the name of the EC2 instance you want to include in your assessment target:<br \/>\n<img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-37816 aligncenter\" src=\"\/blog\/wp-ttn-blog\/uploads\/2016\/07\/Screenshot-from-2016-07-12-154903.png\" alt=\"Screenshot from 2016-07-12 15:49:03\" width=\"971\" height=\"374\" \/><\/li>\n<li>On\u00a0<strong>Define assessment template page<\/strong>, specify the name for the assessment template. For\u00a0<strong>Rule packages<\/strong>, select the rule packages that you want to use in the assessment template.<br \/>\nIn\u00a0<strong>Duration<\/strong>\u00a0field, specify the duration for your assessment template. Click\u00a0<strong>Next:<\/strong><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-37817\" src=\"\/blog\/wp-ttn-blog\/uploads\/2016\/07\/Screenshot-from-2016-07-12-154936.png\" alt=\"Screenshot from 2016-07-12 15:49:36\" width=\"959\" height=\"520\" \/><\/li>\n<li>On the\u00a0<strong>Review\u00a0page<\/strong>, review the selections, and then choose<strong>\u00a0Create and run:<\/strong><br \/>\n<img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-37818\" src=\"\/blog\/wp-ttn-blog\/uploads\/2016\/07\/Screenshot-from-2016-07-12-155001.png\" alt=\"Screenshot from 2016-07-12 15:50:01\" width=\"949\" height=\"609\" \/><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center;\"><strong><span style=\"text-decoration: underline;\">Locating the Generated Findings<\/span><\/strong><\/h2>\n<p>In the Amazon Inspector console, navigate to the\u00a0Findings\u00a0page. It will show the inspector findings along with the severity as below:<br \/>\n<strong> <img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-37820\" src=\"\/blog\/wp-ttn-blog\/uploads\/2016\/07\/Screenshot-from-2016-07-13-095058.png\" alt=\"Screenshot from 2016-07-13 09:50:58\" width=\"1038\" height=\"204\" \/><\/strong><\/p>\n<p>This is how Amazon Inspector helps us to identify the vulnerabilities\u00a0in our EC2 instances and also provides the recommendations to fix them up.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AWS Inspector is an automated security assessment service which helps to improve the security and compliance of applications deployed on AWS EC2 by identifying potential security issues, vulnerabilities, or deviations from security standards. Using Amazon Inspector, one can easily automate security testing across development, test, and production environments, identifying security vulnerabilities as a part of [&hellip;]<\/p>\n","protected":false},"author":914,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":3},"categories":[2348,1],"tags":[3779,248,3582,1916,3468],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/37582"}],"collection":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/users\/914"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/comments?post=37582"}],"version-history":[{"count":0,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/37582\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/media?parent=37582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/categories?post=37582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/tags?post=37582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}