Amazon Web Services (AWS) ECR
AWS Elastic Container Registry (ECR) Scan
RegScale can also import flat file reports from AWS Inspector. As this interacts with a file, none of the AWS Security Hub settings above apply.
This CLI is able to sync assets and vulnerabilities from a folder containing AWS Inspector csv or json files.
AWS ECR Processing Workflow
The CLI will process each file and load assets and vulnerabilities to RegScale.
- The user first logs into RegScale via the CLI to set the access token or otherwise creates a service account as described in the CLI Login documentation
- The user provides the RegScale SSP ID# and the folder path to the files.
ecr import_ecr
- The primary function of this integration, parse and load data to RegScale.
Required parameters
regscale_ssp_id
The ID number from RegScale of the System Security Plan, required.folder_path
The full folder path where the files are located.scan_date
The date of the scan to be imported
The CLI provides detailed logging throughout the process to indicate progress and to provide troubleshooting in case of issues.
Example Commands
Import scans to SSP #16 in RegScale using the files located in the scans folder.
regscale ecr import_ecr --regscale_ssp_id 16 --folder_path /home/$USER/Documents/scans --scan_date 2024-01-01
NOTE: See All Scanner Integrations for information about how this updates Issues/POAMs
Updated about 1 month ago