Skip to content

[aws] Update inspector data stream for Cloud Detection and Response (CDR) workflow #14306

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 18 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 8 additions & 4 deletions packages/aws/_dev/build/docs/inspector.md
Original file line number Diff line number Diff line change
@@ -1,15 +1,19 @@
# Inspector

The [AWS Inspector](https://docs.aws.amazon.com/inspector/) integration collects and parses data from AWS Inspector [Findings](https://docs.aws.amazon.com/inspector/v2/APIReference/API_ListFindings.html) REST APIs.
The [Amazon Inspector](https://docs.aws.amazon.com/inspector/) integration collects and parses data from Amazon Inspector [Findings](https://docs.aws.amazon.com/inspector/v2/APIReference/API_ListFindings.html) REST APIs.
Copy link
Contributor

@kcreddy kcreddy Jun 25, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jamiehynds @cpascale43 , we are changing AWS Inspector into Amazon Inspector as it should be with this change. We are only changing UI elements and not updating any field names, so the custom fields are still aws.inspector.*.
Let me know if you have any concerns.


**IMPORTANT: Extra AWS charges on API requests will be generated by this integration. Check [API Requests](https://www.elastic.co/docs/current/integrations/aws#api-requests) for more details.**

## Compatibility
This module is tested against `Amazon Inspector API version 2.0`.

1. The minimum compatible version of this module is **Elastic Agent 8.4.0**.
2. This module is tested against `AWS Inspector API version 2.0`.
## Agentless-enabled integration

## To collect data from AWS Inspector API, users must have an Access Key and a Secret Key. To create API token follow below steps:
Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to [Agentless integrations](https://www.elastic.co/guide/en/serverless/current/security-agentless-integrations.html) and the [Agentless integrations FAQ](https://www.elastic.co/guide/en/serverless/current/agentless-integration-troubleshooting.html).

Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

## To collect data from Amazon Inspector API, users must have an Access Key and a Secret Key. To create API token follow below steps:

1. Login to https://console.aws.amazon.com/.
2. Go to https://console.aws.amazon.com/iam/ to access the IAM console.
Expand Down
14 changes: 14 additions & 0 deletions packages/aws/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,18 @@
# newer versions go on top
- version: "3.12.0"
changes:
- description: Mapping changes in `inspector` datastream for Cloud Detection and Response (CDR) vulnerability workflow.
type: enhancement
link: https://github.com/elastic/integrations/pull/14306
- description: Parse and map newly introduced fields in the `inspector` data stream.
type: enhancement
link: https://github.com/elastic/integrations/pull/14306
- description: Enable request trace log removal.
type: enhancement
link: https://github.com/elastic/integrations/pull/14306
- description: Enable Agentless deployment.
type: enhancement
link: https://github.com/elastic/integrations/pull/14306
- version: "3.11.0"
changes:
- description: Fix `tlsVersion` parsing when not properly defined in cloudtrail event.
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,7 @@
input: httpjson
skip:
reason: "The cursor is incorrectly set before the chain request call instead of after publishing all the events, which causes the system tests to fail but does not stop the data flow."
link: https://github.com/elastic/integrations/issues/14491
service: guardduty
vars:
secret_access_key: xxxx
Expand Down
Original file line number Diff line number Diff line change
@@ -1,20 +1,18 @@
-----BEGIN CERTIFICATE-----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MIIC1zCCAb8CFBhBTt6yEnLtREKHvN40F2qLleIdMA0GCSqGSIb3DQEBCwUAMCgx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-----END CERTIFICATE-----
Original file line number Diff line number Diff line change
Expand Up @@ -3,5 +3,181 @@ rules:
methods: ["POST"]
responses:
- status_code: 200
body: |
{"findings":[{"awsAccountId":"123456789","description":"Findins message","findingArn":"arn:aws:s3:::sample","firstObservedAt":"1.663703546405E9","inspectorScore":1.2,"inspectorScoreDetails":{"adjustedCvss":{"adjustments":[{"metric":"Base","reason":"use Base metric"}],"cvssSource":"scope1","score":8.9,"scoreSource":"scope2","scoringVector":"Attack Vector","version":"v3.1"}},"lastObservedAt":"1.663703546405E9","networkReachabilityDetails":{"networkPath":{"steps":[{"componentId":"02ce3860-3126-42af-8ac7-c2a661134129","componentType":"type"}]},"openPortRange":{"begin":1234,"end":4567},"protocol":"TCP"},"packageVulnerabilityDetails":{"cvss":[{"baseScore":1.1,"scoringVector":"Attack Vector","source":"scope3","version":"v3.1"}],"referenceUrls":["https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111"],"relatedVulnerabilities":["security"],"source":"example","sourceUrl":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111","vendorCreatedAt":"1.663703546405E9","vendorSeverity":"basic","vendorUpdatedAt":"1.663703546405E9","vulnerabilityId":"123456789","vulnerablePackages":[{"arch":"arch","epoch":123,"filePath":"/example","fixedInVersion":"3","name":"example","packageManager":"BUNDLER","release":"release","sourceLayerHash":"50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c","version":"2.0"}]},"remediation":{"recommendation":{"text":"example","Url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111"}},"resources":[{"details":{"awsEc2Instance":{"iamInstanceProfileArn":"arn:aws:s3:::iam","imageId":"123456789","ipV4Addresses":["89.160.20.128","81.2.69.192"],"ipV6Addresses":["2a02:cf40::"],"keyName":"sample","launchedAt":"1.663703546405E9","platform":"EC2","subnetId":"123456","type":"Instance","vpcId":"3265875"},"awsEcrContainerImage":{"architecture":"arch","author":"example","imageHash":"50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545d","imageTags":["sample"],"platform":"ECR","pushedAt":"1.663703546405E9","registry":"ecr registry","repositoryName":"sample"}},"id":"12345678","partition":"partition","region":"us-east-1","tags":{"string1":"string1","string2":"string2"},"type":"AWS_EC2_INSTANCE"}],"severity":"INFORMATIONAL","status":"ACTIVE","title":"sample findings","type":"NETWORK_REACHABILITY","updatedAt":"1.663703546405E9"}]}
body: |-
{{ minify_json `
{
"findings": [
{
"awsAccountId": "123456789012",
"description": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. <math>, <svg>, etc contexts).",
"epss": {
"score": 0.00024
},
"exploitAvailable": "NO",
"findingArn": "arn:aws:inspector2:us-east-2:123456789012:finding/fb6294abcdef0123456789abcdef8123",
"firstObservedAt": 1748539687.919,
"fixAvailable": "YES",
"inspectorScore": 6.5,
"inspectorScoreDetails": {
"adjustedCvss": {
"adjustments": [],
"cvssSource": "NVD",
"score": 6.5,
"scoreSource": "NVD",
"scoringVector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
}
},
"lastObservedAt": 1749165796.162,
"packageVulnerabilityDetails": {
"cvss": [
{
"baseScore": 6.5,
"scoringVector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"source": "NVD",
"version": "3.1"
},
{
"baseScore": 6.5,
"scoringVector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"source": "NVD",
"version": "3.1"
}
],
"referenceUrls": [
"https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA",
"https://nvd.nist.gov/vuln/detail/CVE-2025-22872",
"https://alas.aws.amazon.com/AL2023/ALAS-2025-981.html",
"https://alas.aws.amazon.com/AL2/ALASDOCKER-2025-064.html",
"https://alas.aws.amazon.com/AL2023/ALAS-2025-980.html",
"https://alas.aws.amazon.com/AL2/ALASDOCKER-2025-063.html",
"https://alas.aws.amazon.com/AL2023/ALAS-2025-979.html",
"https://alas.aws.amazon.com/cve/json/v1/CVE-2025-22872.json",
"https://alas.aws.amazon.com/AL2/ALAS-2025-2863.html",
"https://alas.aws.amazon.com/cve/json/v1/CVE-2025-22872.json"
],
"relatedVulnerabilities": [],
"source": "NVD",
"sourceUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-22872",
"vendorCreatedAt": 1744827364,
"vendorSeverity": "MEDIUM",
"vendorUpdatedAt": 1747437319,
"vulnerabilityId": "CVE-2025-22872",
"vulnerablePackages": [
{
"epoch": 0,
"filePath": "vol-0e47545061282cd35:/p1:opt/cni/bin/aws-cni",
"fixedInVersion": "0.38.0",
"name": "golang.org/x/net",
"packageManager": "GOBINARY",
"version": "v0.1.0"
},
{
"epoch": 0,
"filePath": "vol-0e47545061282cd35:/p1:etc/eks/image-credential-provider/ecr-credential-provider",
"fixedInVersion": "0.38.0",
"name": "golang.org/x/net",
"packageManager": "GOBINARY",
"version": "v0.30.0"
},
{
"epoch": 0,
"filePath": "vol-0e47545061282cd35:/p1:opt/cni/bin/dhcp",
"fixedInVersion": "0.38.0",
"name": "golang.org/x/net",
"packageManager": "GOBINARY",
"version": "v0.30.0"
},
{
"epoch": 0,
"filePath": "vol-0e47545061282cd35:/p1:usr/bin/aws-iam-authenticator",
"fixedInVersion": "0.38.0",
"name": "golang.org/x/net",
"packageManager": "GOBINARY",
"version": "v0.30.0"
},
{
"epoch": 0,
"filePath": "vol-0e47545061282cd35:/p1:usr/bin/kubelet",
"fixedInVersion": "0.38.0",
"name": "golang.org/x/net",
"packageManager": "GOBINARY",
"version": "v0.30.0"
},
{
"arch": "X86_64",
"epoch": 0,
"fixedInVersion": "0:2.0.5-1.amzn2.0.1",
"name": "nerdctl",
"packageManager": "OS",
"release": "1.amzn2.0.1",
"remediation": "yum update nerdctl",
"version": "2.0.4"
}
]
},
"remediation": {
"recommendation": {
"text": "None Provided"
}
},
"resources": [
{
"details": {
"awsEc2Instance": {
"iamInstanceProfileArn": "arn:aws:iam::123456789012:instance-profile/eks-0012345a-1234-5678-1234-6c1abcdef012",
"imageId": "ami-0e0f0123456789abd",
"ipV4Addresses": [
"10.90.1.245",
"10.90.1.45",
"10.90.1.168",
"10.90.1.157",
"1.128.0.1",
"10.90.1.103",
"10.90.1.197",
"10.90.1.220",
"10.90.1.86",
"10.90.1.29",
"10.90.1.18",
"10.90.1.181",
"10.90.1.161",
"10.90.1.229",
"10.90.1.108",
"10.90.1.219",
"10.90.1.9",
"10.90.1.106",
"10.90.1.206"
],
"ipV6Addresses": [],
"launchedAt": 1748534768,
"platform": "AMAZON_LINUX_2",
"subnetId": "subnet-0ababcdefabcdef8b",
"type": "t3.medium",
"vpcId": "vpc-04ab0123456789123"
}
},
"id": "i-0fabcdefabcdef50b",
"partition": "aws",
"region": "us-east-2",
"tags": {
"aws:autoscaling:groupName": "eks-sei_demo_prod_linux-00c12345-abcd-1234-5678-601234567896",
"aws:ec2launchtemplate:version": "6",
"aws:eks:cluster-name": "sei_demo_prod",
"eks:cluster-name": "sei_demo_prod",
"eks:nodegroup-name": "sei_demo_prod_linux",
"k8s.io/cluster-autoscaler/enabled": "true",
"k8s.io/cluster-autoscaler/sei_demo_prod": "owned",
"kubernetes.io/cluster/sei_demo_prod": "owned"
},
"type": "AWS_EC2_INSTANCE"
}
],
"severity": "MEDIUM",
"status": "ACTIVE",
"title": "CVE-2025-22872 - golang.org/x/net, golang.org/x/net and 4 more",
"type": "PACKAGE_VULNERABILITY",
"updatedAt": 1749165796.162
}
]
}
`}}
Original file line number Diff line number Diff line change
@@ -1,28 +1,28 @@
-----BEGIN PRIVATE KEY-----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MIIEvAIBADANBgkqhkiG9w0BAQEFAASCBKYwggSiAgEAAoIBAQCbq5ChvdjWiM2/
tpew4HATwk9KBXB2J4s70DaqxWJwLKzUYEGWXbujk9ONptE97gkaQEGILWB8vjF4
7499a0WRt6LeC5KYjH5+Z3MoD+0Eixo2j6rh+jyxTBb64QR8GUT3oo0cEDOTXFbV
F5ooS1Sber2S5Ww5Edm8jKSYuJ8cJxJDghg9Np4sZZ6JBFIqkftDoLCeCZf4W5u8
n9/386g47TzgI7ojGEER3m2TXOPVIA7XooeGisqUiOpTPHWA0tctkSdjow+JJQ7o
Ui5NJJKdJ2cPbpA11kv9/9TYIpKZf+jUu8ZxTwAwbTjPLbyoqFzle0BYcc4j2zOd
Kuv4OkPXAgMBAAECggEAJZGnw6kmMkxs32ZJQKpB0jr0WMhsRk+v1h0ffGJLqgfW
JCEg4xG3DbjI9yg52mjesIOubReKcECUfvvN1PZ1IUBA4bbIR+GsS4Ra8eG6EX0i
s+VDV+tFB4L2DtEMfIi6sMr9pDayw88ms6HRFgVsI2PhaZjN4A4TTuJgfO0dlTTm
T8RPOhIT4ydRaVBawzZsA5NKpU4PX8mMwNSkoCvnruYNTFb/GE1tsozTnOnMiZ1q
xPEWJNAhoiWPbiZDrjz5OHuTVqI31QDJH06aqfWuAx2H9qJL9BfyKJsotMjyR3Cn
5hgbiJx+9/6rvmhclun4H6DSRmO68+aGQ+65P7wySQKBgQC/x/jmQoMpKCCbJL/A
Nq1sm6/domIMD2DuNoIxdzf5tW7cPBiwu0HEvMFC9BsmhN4o1uiacGSiIJVLEe+Q
/vUjVr+VnW28NvD43kCXceCxKWMInruqTxyqVaSHnPx2TK4uDtbdTqyIzDs6GQSX
i22hbaafR+0/hR18WEy+t8iQ+QKBgQDPzA616QmdJz5PtGxBjKyPNNTokKPOA8Bg
ZKl0Dz9BzEbRMHcBCGYd8DAkOZJvCovxBPoyp2swysjPUrBMpUUEGrh8Ds7a1Oqs
lJLU/fpPMbBD3FpzRLFCaZd7nrZZBbVwkOLaYOiKbxYBkz0Pun8CwZCq0i/WA0U4
I8KmcTp/TwKBgHgzaflH7tU45VbX7acXnhLYcZ3ETRep++LSHz/JrTfBU76NnBwJ
AevBMpA4V1wJIwUNzbQehbRoH6pxj2mdox+HG4U2qrSw6s/Q3UMOiPoBKqUYeB8C
fsDz9K9a4ZFz9ie//UOwL8t91hFP5OTm6sum4iwq9LQ/Rn/NCCzxG7BhAoGAOBLT
oWkaTAsr+Gwyjlm8swRJs9xcJ5rBjgF77LK0mjfaoFaYtnGixM9s3kme51IMQ2TZ
c1PUTB1cpP2mT3iFsD7Zq7h/P3QXQ6zwFoPWyQoai6VpzxMpVkeSNiy0/j7ZIGAo
p09hUQH7CT/HSXhFD+RV+pKvj+vgAO89dpa1d2cCgYBwVgPyFdoxYIZhaz9+8f4H
uWdCvgQDINEQD7FOj2SBcqunHehPrNp8uyby4YtSU31sOYyhOBTb5/1LvT8nt+JQ
w4eK1i9FkzE6wSpWhq2Z24LhyL7KMFbqZl8pf2mUGIEMRXVTbD0Ef5s7TeY3YqHQ
oYjDjXq0ttpfVu2mvOUchQ==
-----END PRIVATE KEY-----
Loading