Skip to main content

Amazon Inspector

Amazon Inspector by Amazon Web Services (AWS) is a security assessment tool that scans your AWS environments to identify vulnerabilities and deviations from best practices. You can bring AWS EC2 instance, cloud, code, and other security data from Amazon Inspector into Brinqa to gain a comprehensive view of your AWS security posture, thus strengthening your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with Amazon Inspector and how to obtain that information from Amazon. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select Amazon Inspector from the Connector drop-down. If you cannot find the connector in the drop-down, make sure that you have installed it first. You must provide the following information to authenticate Amazon Inspector with Brinqa:

  • Access key ID and Secret access key: The access keys associated with the Amazon Inspector account, which must have permissions to log in to the API server and return data. For additional information, see Create an IAM user for Amazon Inspector access.

  • Default region: The AWS region for the Amazon Inspector connector. If not specified, the connector uses the AWS default region provider chain to automatically determine the most appropriate region. This ensures that the connector adheres to the recommended AWS practices for region selection. For additional information on AWS regions, refer to the AWS documentation.

  • Assume role: The Amazon Resource Name (ARN) for the role that the connector assumes when accessing AWS services, which must have permissions to log in to the API server and return data.

Create an IAM user for Amazon Inspector access

For the Amazon Inspector connector to interact with the Amazon Inspector API, you must provide specific AWS credentials and permissions. To do so, follow these steps:

  1. Log in to your organization's AWS Management Console as an administrator.

  2. Navigate to the Identity and Access Management (IAM) dashboard.

    IAM Dashboard by searching

  3. From the navigation pane under Access management, click Users, and then click Create user.

  4. Provide a User name, leave the Provide user access to AWS Management Console option unchecked, and then click Next.

  5. Click the Attach policies directly option, search for and select the AmazonInspectorReadOnlyAccess permission.

    Amazon Inspector Read Only Access

  6. Click Next and then click Create user.

    The Users page displays and the new IAM user is available in the Users table.

note

If you do not have permissions to create a new IAM user, contact your AWS administrator. For additional information, see AWS documentation.

Obtain Amazon Inspector access keys

To obtain the access keys required for the integration, follow these steps:

  1. Log in to your organization's AWS Management Console as an administrator.

  2. Navigate to the IAM dashboard.

  3. From the navigation pane under Access management, click Users.

  4. Choose the IAM user you created in the earlier steps.

  5. Click the Security credentials tab and then click Create access key.

  6. Select the Application running outside AWS use case and then click Next.

  7. Provide a description and then click Create access key.

    Amazon access keys

    Your new access keys display. You cannot view the keys again after this. Copy and save them to a safe and secure location.

    note

    If you do not have permissions to create access keys, contact your AWS administrator. For additional information, see AWS documentation.

Create a role and assign permissions

After obtaining the Amazon Inspector access keys, the next step is to create a role and obtain the ARN that is required for the integration. To do so, follow these steps:

  1. From the IAM dashboard, click Roles, and then click Create role.

  2. Choose AWS account for the Trusted entity type and click Next.

  3. Search for and select the AmazonInspectorReadOnlyAccess permission from the list of permissions and click Next.

  4. Assign a name and description and then click Create role.

  5. Back on the Roles page, click the new role and copy the value in the ARN field as shown below. The ARN, along with the access key ID and secret access key, are required for authentication in the integration configuration:

    Amazon Inspector ARN

    note

    If you do not have the permissions to create roles, contact your AWS administrator. For additional information, see AWS documentation.

Additional settings

The Amazon Inspector connector contains an additional option for specific configuration:

  • Session duration: The duration, in seconds, for the assumed role session. This determines the time period during which the credentials issued by the assumed role remain valid. The default setting is 900 seconds, or 15 minutes.

  • Page size: The maximum number of records to get per API request. The default setting is 100. It is not recommended to go over 100.

Types of data to retrieve

The Amazon Inspector connector can retrieve the following types of data from the AWS SDK:

Table 1: Data retrieved from Amazon Inspector

Connector ObjectRequiredMaps to Data Model
AWS EC2 InstanceYesHost
Cloud ResourceYesCloud Resource
Code VulnerabilityYesStatic Code Finding
Code Vulnerability DefinitionYesStatic Code Finding Definition
Network Reachability FindingYesViolation
Network Reachability Finding DefinitionYesViolation Definition
Package VulnerabilityYesVulnerability
Package Vulnerability DefinitionYesVulnerability Definition
info

For detailed steps on how to view the data retrieved from Amazon Inspector in the Brinqa Platform, see How to view your data.

Attribute mappings

Expand the sections below to view the mappings between the source and the Brinqa data model attributes.

AWS EC2 Instance

Table 2: AWS EC2 Instance attribute mappings

Source Field NameMaps to Attribute
CATEGORIEScategories
IMAGE_IDimage
IAM_INSTANCE_PROFILE_ARNLocal variable
IP_V4_ADDRESSESipAddresses, privateIpAddresses, publicIpAddresses
IP_V6_ADDRESSESipAddresses, privateIpAddresses, publicIpAddresses
KEY_NAMELocal variable
LAUNCHED_ATLocal variable
NAMEname
REGIONregion
SUBNET_IDLocal variable
TAGStags
TYPEtype
UIDuid
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Cloud Resource

Table 3: Cloud Resource attribute mappings

Source Field NameMaps to Attribute
ARCHITECTURELocal variable
AUTHORLocal variable
CATEGORIEScategories
CODE_SHA_256Local variable
ECR_CONTAINER_IMAGE_PLATFORMLocal variable
EXECUTION_ROLE_ARNLocal variable
FUNCTION_NAMELocal variable
IMAGE_HASHLocal variable
LAMBDA_FUNCTION_VPC_IDLocal variable
LAST_MODIFIED_ATsourceLastModified
LAYERSLocal variable
NAMEname
PACKAGE_TYPELocal variable
PUSHED_ATsourceCreatedDate
REPOSITORY_NAMErepository
REGIONregion
REGISTRYregistry
RUN_TIMELocal variable
SECURITY_GROUP_IDSLocal variable
SUBNET_IDSLocal variable
TAGStags
UIDuid
VERSIONcurrentVersion
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Code Vulnerability

Table 4: Code Vulnerability attribute mappings

Source Field NameMaps to Attribute
CATEGORIEScategories
CLOUD_ACCOUNT_IDcloudAccountId
FIRST_FOUNDfirstFound
INSPECTOR_SCORELocal variable
LAST_FOUNDlastFound
PATHpath
SOURCE_STATUSsourceStatus
STATUSstatus
STATUS_CATEGORYstatusCategory
TARGETStargets
TYPEtype
UIDuid
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Code Vulnerability Definition

Table 5: Code Vulnerability Definition attribute mappings

Source Field NameMaps to Attribute
CATEGORIEScategories
CLOUD_ACCOUNT_IDcloudAccountId
CWE_IDScweIds
DETECTOR_IDLocal variable
DETECTOR_NAMELocal variable
FIRST_FOUNDfirstFound
INSPECTOR_SCORELocal variable
LAST_FOUNDlastFound
RULE_IDLocal variable
SOURCE_STATUSsourceStatus
STATUSstatus
STATUS_CATEGORYstatusCategory
TAGStags
TARGETStargets
TYPEtype
UIDuid
WEAKNESSESweaknesses
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Network Reachability Finding

Table 6: Network Reachability Finding attribute mappings

Source Field NameMaps to Attribute
CATEGORIEScategories
CLOUD_ACCOUNT_IDcloudAccountId
FIRST_FOUNDfirstFound
INSPECTOR_SCORELocal variable
LAST_FOUNDlastFound
PATHpath
PORTport
SOURCE_STATUSsourceStatus
STATUSstatus
STATUS_CATEGORYstatusCategory
TARGETStargets
TYPEtype
UIDuid
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Network Reachability Finding Definition

Table 7: Network Reachability Finding Definition attribute mappings

Source Field NameMaps to Attribute
CATEGORIEScategories
CLOUD_ACCOUNT_IDcloudAccountId
FIRST_FOUNDfirstFound
INSPECTOR_SCORELocal variable
LAST_FOUNDlastFound
SOURCE_STATUSsourceStatus
STATUSstatus
STATUS_CATEGORYstatusCategory
TARGETStargets
TYPEtype
UIDuid
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Package Vulnerability

Table 8: Package Vulnerability attribute mappings

Source Field NameMaps to Attribute
AFFECTEDaffected
CATEGORIEScategories
CLOUD_ACCOUNT_IDcloudAccountId
FIRST_FOUNDfirstFound
INSPECTOR_SCORELocal variable
LAST_FOUNDlastFound
SOURCE_STATUSsourceStatus
STATUSstatus
STATUS_CATEGORYstatusCategory
TARGETStargets
TYPEtype
UIDuid
VULNERABILITY_IDLocal variable
VULNERABILITY_SOURCELocal variable
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Package Vulnerability Definition

Table 9: Package Vulnerability Definition attribute mappings

Source Field NameMaps to Attribute
CATEGORIEScategories
CLOUD_ACCOUNT_IDcloudAccountId
CVSS_V2_ACcvssV2Ac
CVSS_V2_AIcvssV2Ai
CVSS_V2_AUcvssV2Au
CVSS_V2_AVcvssV2Av
CVSS_V2_BASE_SCOREcvssV2BaseScore
CVSS_V2_CIcvssV2Ci
CVSS_V2_EcvssV2E
CVSS_V2_IIcvssV2Ii
CVSS_V2_RCcvssV2Rc
CVSS_V2_RLcvssV2Rl
CVSS_V2_SEVERITYcvssV2Severity
CVSS_V2_VECTORcvssV2Vector
CVSS_V3_ACcvssV3Ac
CVSS_V3_AIcvssV3Ai
CVSS_V3_AVcvssV3Av
CVSS_V3_BASE_SCOREcvssV3BaseScore
CVSS_V3_CIcvssV3Ci
CVSS_V3_EcvssV3E
CVSS_V3_IIcvssV3Ii
CVSS_V3_PRcvssV3Pr
CVSS_V3_RCcvssV3Rc
CVSS_V3_RLcvssV3Rl
CVSS_V3_SEVERITYcvssV3Severity
CVSS_V3_UIcvssV3Ui
CVSS_V3_VECTORcvssV3Vector
FIRST_FOUNDfirstFound
INSPECTOR_SCORELocal variable
LAST_FOUNDlastFound
SOURCE_STATUSsourceStatus
STATUSstatus
STATUS_CATEGORYstatusCategory
TARGETStargets
TYPEtype
UIDuid
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

APIs

The Amazon Inspector connector uses the AWS SDK version 2.25.6.

Changelog

The Amazon Inspector connector has undergone the following changes:

3.0.11

  • No change.

3.0.10

  • Fixed an issue where CVE identifiers were not correctly mapped on the Vulnerability Definition object.

  • Fixed an issue where the SEVERITY and SOURCE_SEVERITY attributes were incorrectly mapped on the Code Vulnerability Definition and Package Vulnerability Definition objects.

3.0.9

  • Removed the PLATFORM and VPC_ID attributes from the AWS EC2 Instance object.

3.0.8

  • Added the following attributes to the AWS EC2 Instance object:

    • I_AM_INSTANCE_PROFILE_ARN
    • IMAGE_ID
    • IP_V4_ADDRESSES
    • IP_V6_ADDRESSES
    • KEY_NAME
    • LAUNCHED_AT
    • PLATFORM
    • SUBNET_ID
    • TYPE
    • VPC_ID

3.0.7

  • Fixed some attribute type data mismatches.

3.0.6

  • Fixed an issue where syncs were resulting in a "No locks available" error.

3.0.5