1 réponse
- Le plus récent
- Le plus de votes
- La plupart des commentaires
1
Hello.
As you know, you can use AWS Config rules to notify you when unauthorized software is installed.
However, I think this rule would be difficult to handle if you want to be notified when new software is installed.
https://docs.aws.amazon.com/config/latest/developerguide/ec2-managedinstance-applications-required.html
If you use Amazon Inspector, it may be possible to notify you when software is installed.
https://docs.aws.amazon.com/inspector/latest/user/scanning-ec2.html
- When you launch a new EC2 instance.
- When you install new software on an existing EC2 instance (Linux and Mac).
- When Amazon Inspector adds a new common vulnerabilities and exposures (CVE) item to its database, and that CVE is relevant to your EC2 instance (Linux and Mac).
Contenus pertinents
- demandé il y a un an
- demandé il y a 9 mois
- demandé il y a un an
- demandé il y a 7 mois
- AWS OFFICIELA mis à jour il y a 8 mois
- AWS OFFICIELA mis à jour il y a 7 mois
I tried to create an event bridge rule:
{ "source": ["aws.inspector"], "detail-type": ["Inspector Assessment Run State Change"], "detail": { "state": ["COMPLETED"] } }
Downloaded/installed docker on my linux 2 instance, but didn't seem to trigger the rule. Any ideas?