You want to get a list of vulnerabilities for an EC2 Instance as per the guidelines set by the Center of Internet Security.
How can you go about doing this?
Click on the arrows to vote for the correct answer
A. B. C. D.Answer is C.
Option A is incorrect as GuardDuty is used for threat detection and prevention but does not provide a list of vulnerabilities as per CIS guidelines.
Option B is incorrect as AWS Trusted Advisor is generally used to optimize your AWS infrastructure, increase security and performance, reduce your overall costs, and monitor service limits.
This does not provide the list of vulnerabilities as per the CIS guidelines.
Option C is correct as Amazon Inspector currently provides the CIS Certified rules packages to help establish secure configuration postures for several operating systems.
Option D is incorrect as Amazon Macie is used for cost-efficiently discovery of sensitive data at scale and does not provide what the questions asks.
i.e list of vulnerabilities as per CIS guidelines.
The AWS Inspector service can inspect EC2 Instances based on specific Rules.
One of the rules packages is based on the guidelines set by the Center of Internet Security.
For more information on the guidelines, please refer the below URL:
https://docs.aws.amazon.com/inspector/latest/userguide/inspector_cis.htmlTo get a list of vulnerabilities for an EC2 Instance as per the guidelines set by the Center of Internet Security, you should use AWS Inspector. AWS Inspector is a service that helps you to identify potential security issues and vulnerabilities in your applications and infrastructure. It works by analyzing your EC2 instances for vulnerabilities based on the Center of Internet Security (CIS) benchmarks.
Here's how you can use AWS Inspector to get a list of vulnerabilities for an EC2 Instance:
First, you need to install and configure the AWS Inspector agent on the EC2 Instance you want to scan. You can do this by following the instructions provided by AWS Inspector.
Once the agent is installed and configured, you can create an assessment target in AWS Inspector. An assessment target is a collection of EC2 instances that you want to scan for vulnerabilities.
After you create an assessment target, you can start an assessment run. An assessment run is a scan of your EC2 instances for potential security issues and vulnerabilities.
Once the assessment run is complete, AWS Inspector will generate a report that includes a list of vulnerabilities found on the EC2 Instance, as per the guidelines set by the Center of Internet Security.
Therefore, Option C - Use AWS Inspector is the correct answer.
Option A - Enable AWS Guard Duty for the Instance is incorrect because AWS Guard Duty is a threat detection service that helps you to monitor your AWS environment for malicious activity and unauthorized behavior, it does not provide vulnerability scanning as per CIS benchmarks.
Option B - Use AWS Trusted Advisor is incorrect because AWS Trusted Advisor is a service that provides best practices and optimization recommendations for your AWS environment, it does not provide vulnerability scanning as per CIS benchmarks.
Option D - Use AWS Macie is incorrect because AWS Macie is a data classification and security service that helps you to discover, classify, and protect sensitive data in your AWS environment, it does not provide vulnerability scanning as per CIS benchmarks.