You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jan 24, 2025. It is now read-only.
Amazon Inspector is a vulnerability management service that scans AWS workloads for known software vulnerabilities.
4
4
5
-
This GitHub Action allows you to scan EC2 instances for software vulnerabilities using Amazon Inspector from your GitHub Actions workflows.
5
+
This GitHub Action allows you to scan EC2 instances for software vulnerabilities using Amazon Inspector from your GitHub Actions workflows. Both agent-based and agentless scans are supported. Additionally, this action can create Jira tickets for each new individual vulnerability detected.
6
6
7
-
An active AWS account is required to use this action.
8
7
9
8
## Overview
10
9
This action works by utilizing Amazon Inspector to scan specified EC2 instances for known vulnerabilities.
@@ -14,7 +13,8 @@ This action works by utilizing Amazon Inspector to scan specified EC2 instances
14
13
- Required: You must have an active AWS account to use this action.
15
14
- Required: You must have read access to the InspectorScan API.
16
15
- Required: You must configure AWS authentication for use in GitHub action workflows.
17
-
- Required: Create a GitHub Actions workflow if you do not already have one.
16
+
- Required: Create a GitHub Actions workflow if you do not already have one.
17
+
- Optional: Configure Jira authentication if you want to create Jira tickets for each new vulnerability. You need the Jira URL, Jira username, and Jira API token.
18
18
19
19
## Usage
20
20
@@ -51,12 +51,19 @@ jobs:
51
51
# modify this block to scan your intended EC2 instances
0 commit comments