A terraform module to deploy Amazon Inspector
- Amazon Inspector Agent installed on desired EC2 instances.
- Amazon Inspector Region-Specific ARNs for rules packages.
Module version 3.1 supports Terraform 0.13 up to (but not including) 1.0 (which is yet to be released at the). Module version 1.x supports Terraform 0.12.
Note: this module currently does not support the customization of assessment targets. All EC2 instances with the AWS Inspector agent installed will be included on an assessment.
name_prefix
- Used as a prefix for resources created in AWS.
enable_scheduled_event
- Defaulttrue
; A way to disable Inspector from running on a scheduleschedule_expression
- Defaultrate(7 days)
; How often to run an Inspector assessment. See AWS Schedule Expression documentation for more info on formatting.sassessment_duration
- Default3600
; How long the assessment runs in seconds.ruleset_cve
- Defaulttrue
; Includes the Common Vulnerabilties and Exposures ruleset in the Inspector assessment.ruleset_cis
- Defaulttrue
; Includes the CIS Benchmarks ruleset in the Inspector assessment.ruleset_security_best_practices
- Defaulttrue
; Includes the AWS Security Best Practices ruleset in the Inspector assessment.ruleset_network_reachability
- Defaulttrue
; Includes the Network Reachability ruleset in the Inspector assessment.
It doesn't take much to get off the ground with this module. All you need to get started scanning is this:
module "my-inspector-deployment" {
source = "USSBA/inspector/aws"
version = "~> 2.0"
name_prefix = "my-inspector"
}
An example showing a customized schedule and rulesets:
module "my-inspector-deployment" {
source = "USSBA/inspector/aws"
version = "~> 3.0"
name_prefix = "my-inspector"
enable_scheduled_event = true
schedule_expression = "cron(0 14 * * ? *)"
ruleset_cve = true
ruleset_cis = false
ruleset_security_best_practices = true
ruleset_network_reachability = false
}
We welcome contributions. To contribute please read our CONTRIBUTING document.
All contributions are subject to the license and in no way imply compensation for contributions.
Our code base now exists in Terraform 0.13 and we are halting new features in the Terraform 0.12 major version. If you wish to make a PR or merge upstream changes back into 0.12, please submit a PR to the terraform-0.12
branch.
We strive for a welcoming and inclusive environment for all SBA projects.
Please follow this guidelines in all interactions:
- Be Respectful: use welcoming and inclusive language.
- Assume best intentions: seek to understand other's opinions.
Please do not submit an issue on GitHub for a security vulnerability. Instead, contact the development team through HQVulnerabilityManagement. Be sure to include all pertinent information.
The agency reserves the right to change this policy at any time.