Inspector

  • Inspector tests the network accessibility of your EC2 instances and the security state of your applications that run on those instances.

  • Inspector assesses applications for exposure, vulnerabilities, and deviations from best practices.

  • After performing an assessment, Inspector produces a detailed list of security findings that is organized by level of severity.

Inspector rules packages

  • A rule is a security check that Inspector performs during the assessment run.

  • An Inspector assessment can use any combination of the following rules packages:

    • Network Reachability.

      • Analyse your network configurations to find security vulnerabilities of your EC2 instances.

    • Common vulnerabilities and exposures.

      • Verify whether the EC2 instances in your assessment targets are exposed to common vulnerabilities and exposures (CVEs).

    • Center for Internet Security (CIS) Benchmarks.

      • The CIS Security Benchmarks program provides well-defined, unbiased, consensus-based industry best practices to help organizations assess and improve their security.

    • Security best practices for inspector.

      • Disable Root Login via SSH.

      • Support SSH V2 only.

      • Disable Password Authentication via SSH.

      • Configure maximum password age and minimum length.

      • Configuring password complexity.

      • Enable ASLR and DEP.

      • Configure permissions for system directories.

Last updated

Was this helpful?