Inspector
Inspector tests the network accessibility of your EC2 instances and the security state of your applications that run on those instances.
Inspector assesses applications for exposure, vulnerabilities, and deviations from best practices.
After performing an assessment, Inspector produces a detailed list of security findings that is organized by level of severity.
Inspector rules packages
A rule is a security check that Inspector performs during the assessment run.
An Inspector assessment can use any combination of the following rules packages:
Network Reachability.
Analyse your network configurations to find security vulnerabilities of your EC2 instances.
Common vulnerabilities and exposures.
Verify whether the EC2 instances in your assessment targets are exposed to common vulnerabilities and exposures (CVEs).
Center for Internet Security (CIS) Benchmarks.
The CIS Security Benchmarks program provides well-defined, unbiased, consensus-based industry best practices to help organizations assess and improve their security.
Security best practices for inspector.
Disable Root Login via SSH.
Support SSH V2 only.
Disable Password Authentication via SSH.
Configure maximum password age and minimum length.
Configuring password complexity.
Enable ASLR and DEP.
Configure permissions for system directories.
Last updated
Was this helpful?