Skip to content
This repository was archived by the owner on Jan 24, 2025. It is now read-only.

Commit 5f38cf2

Browse files
authored
Update README.md
1 parent 147fe00 commit 5f38cf2

File tree

1 file changed

+17
-7
lines changed

1 file changed

+17
-7
lines changed

README.md

+17-7
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,9 @@
1-
# EC2 Vulnerability Scan GitHub Action for Amazon Inspector
1+
# EC2 Vulnerability Scanfor Amazon Inspector (Plus Jira Intergration)
22

33
Amazon Inspector is a vulnerability management service that scans AWS workloads for known software vulnerabilities.
44

5-
This GitHub Action allows you to scan EC2 instances for software vulnerabilities using Amazon Inspector from your GitHub Actions workflows.
5+
This GitHub Action allows you to scan EC2 instances for software vulnerabilities using Amazon Inspector from your GitHub Actions workflows. Both agent-based and agentless scans are supported. Additionally, this action can create Jira tickets for each new individual vulnerability detected.
66

7-
An active AWS account is required to use this action.
87

98
## Overview
109
This action works by utilizing Amazon Inspector to scan specified EC2 instances for known vulnerabilities.
@@ -14,7 +13,8 @@ This action works by utilizing Amazon Inspector to scan specified EC2 instances
1413
- Required: You must have an active AWS account to use this action.
1514
- Required: You must have read access to the InspectorScan API.
1615
- Required: You must configure AWS authentication for use in GitHub action workflows.
17-
- Required: Create a GitHub Actions workflow if you do not already have one.
16+
- Required: Create a GitHub Actions workflow if you do not already have one.
17+
- Optional: Configure Jira authentication if you want to create Jira tickets for each new vulnerability. You need the Jira URL, Jira username, and Jira API token.
1818

1919
## Usage
2020

@@ -51,12 +51,19 @@ jobs:
5151
# modify this block to scan your intended EC2 instances
5252
- name: Inspector Scan
5353
id: inspector
54-
uses: action.yml
54+
uses: ./path/to/your/action
5555
with:
5656
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
5757
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
5858
aws-region: ${{ secrets.AWS_REGION }}
5959
assessment-run-arn: 'arn:aws:inspector:us-west-2:123456789012:assessment-run/assessment-run-id'
60+
agentless: true # Set to true to use agentless scans
61+
62+
# Jira integration parameters (optional)
63+
jira-url: ${{ secrets.JIRA_URL }}
64+
jira-username: ${{ secrets.JIRA_USERNAME }}
65+
jira-api-token: ${{ secrets.JIRA_API_TOKEN }}
66+
jira-project-key: ${{ secrets.JIRA_PROJECT_KEY }}
6067

6168
# If enabled, this setting will display Inspector's vulnerability scan findings
6269
# as a GitHub actions step summary. See here for an example step summary:
@@ -107,6 +114,7 @@ jobs:
107114
# Replace 'echo' with 'exit' if you want to fail the job.
108115
- name: On vulnerability threshold exceeded
109116
run: echo ${{ steps.inspector.outputs.vulnerability_threshold_exceeded }}
117+
110118
```
111119

112120

@@ -120,12 +128,13 @@ The below example shows how to enable action outputs in various locations and fo
120128
```yaml
121129
- name: Scan EC2 instances
122130
id: inspector
123-
uses: action.yml
131+
uses: ./path/to/your/action
124132
with:
125133
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
126134
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
127135
aws-region: ${{ secrets.AWS_REGION }}
128136
assessment-run-arn: 'arn:aws:inspector:us-west-2:123456789012:assessment-run/assessment-run-id'
137+
agentless: true
129138
display_vulnerability_findings: "enabled"
130139

131140
# Display Inspector results in the GitHub Actions terminal
@@ -161,12 +170,13 @@ Vulnerability thresholds can be used to support custom logic, such as failing th
161170
```yaml
162171
- name: Invoke Amazon Inspector Scan
163172
id: inspector
164-
uses: action.yml
173+
uses: ./path/to/your/action
165174
with:
166175
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
167176
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
168177
aws-region: ${{ secrets.AWS_REGION }}
169178
assessment-run-arn: 'arn:aws:inspector:us-west-2:123456789012:assessment-run/assessment-run-id'
179+
agentless: true
170180
display_vulnerability_findings: "enabled"
171181

172182
# If the number of vulnerabilities equals or exceeds

0 commit comments

Comments
 (0)