|
1 |
| -name: 'Fetch Inspector Scan Results' |
| 1 | +name: Scan EC2 Instances with Amazon Inspector |
2 | 2 | on: [push]
|
3 |
| - |
4 | 3 | jobs:
|
5 |
| - fetch-scan-results: |
6 |
| - runs-on: ubuntu-latest |
7 |
| - steps: |
8 |
| - - name: Checkout repository |
9 |
| - uses: actions/checkout@v2 |
10 |
| - |
11 |
| - - name: Get Amazon Inspector Scan Results |
12 |
| - uses: ./path/to/your/action |
13 |
| - with: |
14 |
| - aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} |
15 |
| - aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} |
16 |
| - aws-region: 'us-west-2' |
17 |
| - inspector-assessment-run-arn: 'arn:aws:inspector:us-west-2:123456789012:assessment-run/assessment-run-id' |
| 4 | + daily_job: |
| 5 | + runs-on: ubuntu-latest |
| 6 | + |
| 7 | + # change this to match your GitHub Secrets environment |
| 8 | + environment: |
| 9 | + name: your_github_secrets_environment |
| 10 | + |
| 11 | + steps: |
| 12 | + - name: Configure AWS credentials |
| 13 | + uses: aws-actions/configure-aws-credentials@v4 |
| 14 | + with: |
| 15 | + aws-region: "us-east-1" |
| 16 | + role-to-assume: "arn:aws:iam::<AWS_ACCOUNT_ID>:role/<IAM_ROLE_NAME>" |
| 17 | + |
| 18 | + - name: Checkout this repository |
| 19 | + uses: actions/checkout@v4 |
| 20 | + |
| 21 | + - name: Inspector Scan |
| 22 | + id: inspector |
| 23 | + |
| 24 | + with: |
| 25 | + aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} |
| 26 | + aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} |
| 27 | + aws-region: ${{ secrets.AWS_REGION }} |
| 28 | + assessment-run-arn: 'arn:aws:inspector:us-west-2:123456789012:assessment-run/assessment-run-id' |
| 29 | + agentless: true # Set to true to use agentless scans |
| 30 | + |
| 31 | + # Jira integration parameters (optional) |
| 32 | + jira-url: ${{ secrets.JIRA_URL }} |
| 33 | + jira-username: ${{ secrets.JIRA_USERNAME }} |
| 34 | + jira-api-token: ${{ secrets.JIRA_API_TOKEN }} |
| 35 | + jira-project-key: ${{ secrets.JIRA_PROJECT_KEY }} |
| 36 | + |
| 37 | + display_vulnerability_findings: "enabled" |
| 38 | + |
| 39 | + critical_threshold: 1 |
| 40 | + high_threshold: 1 |
| 41 | + medium_threshold: 1 |
| 42 | + low_threshold: 1 |
| 43 | + other_threshold: 1 |
| 44 | + |
| 45 | + - name: Display Inspector vulnerability scan results (JSON) |
| 46 | + run: cat ${{ steps.inspector.outputs.inspector_scan_results }} |
| 47 | + |
| 48 | + - name: Display Inspector vulnerability scan results (CSV) |
| 49 | + run: cat ${{ steps.inspector.outputs.inspector_scan_results_csv }} |
| 50 | + |
| 51 | + - name: Display Inspector vulnerability scan results (Markdown) |
| 52 | + run: cat ${{ steps.inspector.outputs.inspector_scan_results_markdown }} |
| 53 | + |
| 54 | + - name: Upload Scan Results |
| 55 | + uses: actions/upload-artifact@v4 |
| 56 | + with: |
| 57 | + name: Inspector Vulnerability Scan Artifacts |
| 58 | + path: | |
| 59 | + ${{ steps.inspector.outputs.inspector_scan_results }} |
| 60 | + ${{ steps.inspector.outputs.inspector_scan_results_csv }} |
| 61 | + ${{ steps.inspector.outputs.inspector_scan_results_markdown }} |
| 62 | +
|
| 63 | + - name: On vulnerability threshold exceeded |
| 64 | + run: echo ${{ steps.inspector.outputs.vulnerability_threshold_exceeded }} |
0 commit comments