Skip to main content
Latest Documentation
This is the latest documentation for the Cloud Posse Reference Architecture. To determine which version you're currently using, please see Version Identification.

AWS Inspector 2

AWS Inspector 2 provides automated vulnerability scanning for EC2 instances, container images in ECR, and Lambda functions across your AWS Organization using machine learning and pattern matching.

Overview

AWS Inspector 2 provides:

  • EC2 Scanning: Vulnerability assessment of EC2 instances using SSM Agent
  • ECR Scanning: Container image scanning for vulnerabilities in your registries
  • Lambda Scanning: Function code and dependency vulnerability detection
  • Continuous Monitoring: Real-time vulnerability detection as CVEs are published
  • Multi-account Support: Centralized management across your organization

Scan Types

Scan TypeDescription
EC2Scans for software vulnerabilities and network reachability issues
ECRScans container images for OS and programming language package vulnerabilities
LambdaScans function code and dependencies for vulnerabilities

Architecture

Deployment

Inspector uses a 2-step delegated administrator deployment model.

Step 1: Deploy to Organization Management Account

Root Access Required:

This step requires root account access (such as with the managers profile).

# core-ue1-root
components:
terraform:
aws-inspector2/root:
metadata:
component: aws-inspector2
backend:
s3:
role_arn: null
vars:
enabled: true
delegated_administrator_account_name: core-security
environment: ue1
region: us-east-1
atmos terraform apply aws-inspector2/root -s core-ue1-root

Step 2: Deploy Organization Settings

# core-ue1-security
components:
terraform:
aws-inspector2/org-settings:
metadata:
component: aws-inspector2
vars:
enabled: true
delegated_administrator_account_name: core-security
environment: ue1
region: us-east-1
admin_delegated: true
# Scan types to enable
auto_enable_ec2: true
auto_enable_ecr: true
auto_enable_lambda: true
atmos terraform apply aws-inspector2/org-settings -s core-ue1-security

Multi-Region Deployment

Repeat both steps for each region:

# us-east-1
atmos terraform apply aws-inspector2/root -s core-ue1-root
atmos terraform apply aws-inspector2/org-settings -s core-ue1-security

# us-west-2
atmos terraform apply aws-inspector2/root -s core-uw2-root
atmos terraform apply aws-inspector2/org-settings -s core-uw2-security

Scan Configuration

Configure which resource types to scan:

components:
terraform:
aws-inspector2/org-settings:
vars:
enabled: true
admin_delegated: true
# Enable/disable specific scan types
auto_enable_ec2: true
auto_enable_ecr: true
auto_enable_lambda: true

Key Variables

VariableDescriptionDefault
admin_delegatedSet to true after delegation is completefalse
auto_enable_ec2Auto-enable EC2 scanning for new memberstrue
auto_enable_ecrAuto-enable ECR scanning for new memberstrue
auto_enable_lambdaAuto-enable Lambda scanning for new memberstrue
member_association_excludesList of accounts to exclude from scanning[]

Security Hub Integration

Inspector automatically sends findings to Security Hub when both services are enabled. No additional configuration required.

See Also

References