Skip to content
This repository was archived by the owner on Jan 24, 2025. It is now read-only.

Commit dae5da2

Browse files
authored
Update fetch-inspector-results.yml
1 parent 5f08351 commit dae5da2

File tree

1 file changed

+62
-15
lines changed

1 file changed

+62
-15
lines changed
+62-15
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,64 @@
1-
name: 'Fetch Inspector Scan Results'
1+
name: Scan EC2 Instances with Amazon Inspector
22
on: [push]
3-
43
jobs:
5-
fetch-scan-results:
6-
runs-on: ubuntu-latest
7-
steps:
8-
- name: Checkout repository
9-
uses: actions/checkout@v2
10-
11-
- name: Get Amazon Inspector Scan Results
12-
uses: ./path/to/your/action
13-
with:
14-
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
15-
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
16-
aws-region: 'us-west-2'
17-
inspector-assessment-run-arn: 'arn:aws:inspector:us-west-2:123456789012:assessment-run/assessment-run-id'
4+
daily_job:
5+
runs-on: ubuntu-latest
6+
7+
# change this to match your GitHub Secrets environment
8+
environment:
9+
name: your_github_secrets_environment
10+
11+
steps:
12+
- name: Configure AWS credentials
13+
uses: aws-actions/configure-aws-credentials@v4
14+
with:
15+
aws-region: "us-east-1"
16+
role-to-assume: "arn:aws:iam::<AWS_ACCOUNT_ID>:role/<IAM_ROLE_NAME>"
17+
18+
- name: Checkout this repository
19+
uses: actions/checkout@v4
20+
21+
- name: Inspector Scan
22+
id: inspector
23+
24+
with:
25+
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
26+
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
27+
aws-region: ${{ secrets.AWS_REGION }}
28+
assessment-run-arn: 'arn:aws:inspector:us-west-2:123456789012:assessment-run/assessment-run-id'
29+
agentless: true # Set to true to use agentless scans
30+
31+
# Jira integration parameters (optional)
32+
jira-url: ${{ secrets.JIRA_URL }}
33+
jira-username: ${{ secrets.JIRA_USERNAME }}
34+
jira-api-token: ${{ secrets.JIRA_API_TOKEN }}
35+
jira-project-key: ${{ secrets.JIRA_PROJECT_KEY }}
36+
37+
display_vulnerability_findings: "enabled"
38+
39+
critical_threshold: 1
40+
high_threshold: 1
41+
medium_threshold: 1
42+
low_threshold: 1
43+
other_threshold: 1
44+
45+
- name: Display Inspector vulnerability scan results (JSON)
46+
run: cat ${{ steps.inspector.outputs.inspector_scan_results }}
47+
48+
- name: Display Inspector vulnerability scan results (CSV)
49+
run: cat ${{ steps.inspector.outputs.inspector_scan_results_csv }}
50+
51+
- name: Display Inspector vulnerability scan results (Markdown)
52+
run: cat ${{ steps.inspector.outputs.inspector_scan_results_markdown }}
53+
54+
- name: Upload Scan Results
55+
uses: actions/upload-artifact@v4
56+
with:
57+
name: Inspector Vulnerability Scan Artifacts
58+
path: |
59+
${{ steps.inspector.outputs.inspector_scan_results }}
60+
${{ steps.inspector.outputs.inspector_scan_results_csv }}
61+
${{ steps.inspector.outputs.inspector_scan_results_markdown }}
62+
63+
- name: On vulnerability threshold exceeded
64+
run: echo ${{ steps.inspector.outputs.vulnerability_threshold_exceeded }}

0 commit comments

Comments
 (0)