HomeGuidesChangelog
Guides

AWS Inspector V2

Collects Inspector V2 vulnerability findings, coverage data, and account status for compliance assessment. Designed for GovCloud clients without Security Hub.

Evidence Collected:

  • Inspector account status and enablement state

  • Resource coverage and scan status (EC2, ECR, Lambda)

  • Vulnerability findings with severity, CVE identifiers, and remediation recommendations

  • Coverage statistics by resource type

  • Organization member account scanning status

    Usage:

# Basic evidence collection (default - creates evidence, no issues)
regscale aws sync_inspector --regscale_id 123

# Collect evidence for specific controls
regscale aws sync_inspector --regscale_id 123 --evidence-control-ids RA-5,SI-2,CM-6

# Filter by AWS account
regscale aws sync_inspector --regscale_id 123 --account-id 123456789012

# Filter by resource tags
regscale aws sync_inspector --regscale_id 123 --tags Environment=production,Compliance=required

# Create issues/vulnerabilities from findings (non-default)
regscale aws sync_inspector --regscale_id 123 --create-issues --create-vulnerabilities --no-collect-evidence

# Create POA&Ms for failed controls
regscale aws sync_inspector --regscale_id 123 --create-poams --update-control-status

# Force refresh cached data (cache TTL: 4 hours)
regscale aws sync_inspector --regscale_id 123 --force-refresh

---
Inspector V2 Integration Permissions

┌───────────────────────────────────┬───────────────────────────────────────────────┐
│            Permission             │                    Purpose                    │
├───────────────────────────────────┼───────────────────────────────────────────────┤
│ inspector2:BatchGetAccountStatus  │ Check if Inspector is enabled for the account │
├───────────────────────────────────┼───────────────────────────────────────────────┤
│ inspector2:ListCoverage           │ List resources covered by Inspector scans     │
├───────────────────────────────────┼───────────────────────────────────────────────┤
│ inspector2:ListCoverageStatistics │ Get coverage stats by resource type           │
├───────────────────────────────────┼───────────────────────────────────────────────┤
│ inspector2:ListFindings           │ Pull vulnerability findings                   │
├───────────────────────────────────┼───────────────────────────────────────────────┤
│ inspector2:ListMembers            │ List org member accounts (multi-account only) │
└───────────────────────────────────┴───────────────────────────────────────────────┘

Minimum IAM Policy:
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "RegScaleInspectorReadOnly",
      "Effect": "Allow",
      "Action": [
        "inspector2:BatchGetAccountStatus",
        "inspector2:ListCoverage",
        "inspector2:ListCoverageStatistics",
        "inspector2:ListFindings",
        "inspector2:ListMembers"
      ],
      "Resource": "*"
    }
  ]
}

▎ Note: All Inspector V2 permissions require Resource: "*" — Inspector does not support resource-level restrictions. This is read-only access; the integration never modifies AWS resources.

Optional (for cross-account access via role assumption):
{
  "Sid": "RegScaleCrossAccountAssume",
  "Effect": "Allow",
  "Action": ["sts:AssumeRole"],
  "Resource": "arn:aws:iam::<TARGET_ACCOUNT>:role/<ROLE_NAME>"
}

---
Inspector V2 Authentication

Supports multiple authentication methods (priority order):

1. Cached session (--session-name): From regscale aws auth login
2. Explicit credentials: --aws-access-key-id + --aws_secret_access_key + optional --aws_session_token
3. AWS profile (--profile): Named profile from ~/.aws/credentials
4. Default credential chain: Environment variables, EC2 instance metadata, ECS task role

---
Inspector V2 NIST 800-53 R5 Evidence Workflow

# Complete Inspector evidence collection across all mapped controls
regscale aws sync_inspector --regscale_id 123 --evidence-control-ids RA-5,SI-2,CM-6,SA-11

# Production environment only
regscale aws sync_inspector --regscale_id 123 --tags Environment=production --evidence-control-ids RA-5,SI-2

# Multi-account organization - filter by account
regscale aws sync_inspector --regscale_id 123 --account-id 123456789012

# Full compliance run with issues and POA&Ms
regscale aws sync_inspector --regscale_id 123 \
  --create-issues \
  --create-vulnerabilities \
  --create-poams \
  --update-control-status \
  --evidence-control-ids RA-5,SI-2,CM-6,SA-11

---
Inspector V2 Prerequisites

1. AWS Inspector V2 must be enabled in the target account — the integration checks this via BatchGetAccountStatus before proceeding
2. Resource scanning must be active — enable EC2, ECR, and/or Lambda scanning in Inspector settings
3. For multi-account setups: The calling account must be a delegated administrator for Inspector in the organization
4. Caching: Data is cached for 4 hours use --force-refresh to bypass