You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: scenarios/basics/inspector/SPECIFICATION.md
+46-19Lines changed: 46 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,38 +25,65 @@ This Basics scenario does not require any additional AWS resources.
25
25
26
26
## Hello Amazon Inspector
27
27
28
-
The Hello example is a separate runnable example. - Set up the Inspector service client, checks the current account status for Inspector and displays available scan types.
28
+
The Hello example is intended for users not familiar with this service to easily get up and running. It sets up the Inspector service client, checks the current account status for Inspector and displays available scan types.
29
29
30
30
## Scenario
31
31
32
-
#### Setup
32
+
## Scenario
33
+
34
+
This scenario demonstrates the basic usage of **Amazon Inspector** using a Java program. It focuses on checking account status, enabling Inspector, listing findings, reviewing coverage, and managing filters.
35
+
36
+
---
37
+
38
+
### Setup
39
+
40
+
* Check Amazon Inspector account status
41
+
* Enable Inspector for available resource types (if not already enabled)
42
+
* Display account status summary
43
+
44
+
---
33
45
34
-
* Enable Amazon Inspector for the account
35
-
* Verify Inspector is successfully activated
36
-
* Display account status and enabled scan types
46
+
### Coverage Assessment
37
47
38
-
#### Coverage Assessment
48
+
* List coverage details for scanned resources
49
+
* Display overall coverage statistics
50
+
* Review scan status for resources (general overview)
39
51
40
-
* List coverage statistics for EC2 instances, ECR repositories, and Lambda functions
41
-
* Display resource coverage details
42
-
* Show scanning status for different resource types
52
+
---
43
53
44
-
####Findings Management
54
+
### Findings Management
45
55
46
56
* List security findings across all resource types
47
-
* Filter findings by severity level (CRITICAL, HIGH, MEDIUM, LOW)
48
-
* Retrieve detailed information for specific findings
57
+
* Create an example filter to suppress low-severity findings
58
+
* List existing filters
59
+
60
+
---
61
+
62
+
### Usage and Costs
63
+
64
+
* Check usage totals and metrics for Inspector
65
+
* Review coverage statistics
66
+
67
+
---
68
+
69
+
### Notes
70
+
71
+
* The program **does not retrieve detailed vulnerability (CVE) information**.
72
+
* Resource-specific filtering (e.g., EC2, ECR, Lambda) is **not implemented**.
73
+
* Cleanup (disabling Inspector) is **not performed**.
49
74
50
-
#### Vulnerability Analysis
75
+
---
51
76
52
-
* Display vulnerability details including CVE information
53
-
* Show affected resources and remediation guidance
54
-
* Filter findings by resource type (EC2, ECR, Lambda)
77
+
### Outcome
55
78
56
-
#### Cleanup
79
+
By following this scenario, users learn how to:
57
80
58
-
* Optionally disable Inspector scanning (with user confirmation)
59
-
* Display final account status
81
+
* Check Inspector account status and configuration
0 commit comments