Back to Search

Amazon Inspector User Guide

AUTHOR Team, Documentation
PUBLISHER Samurai Media Limited (06/25/2018)
PRODUCT TYPE Hardcover (Hardcover)

Description

Amazon Inspector enables you to analyze the behavior of your AWS resources and helps you to identify potential security issues. Using Amazon Inspector, you can define a collection of AWS resources that you want to include in an assessment target. You can then create an assessment template and launch a security assessment run of this target.


During the assessment run, the network, file system, and process activity within the specified target are monitored, and a wide set of activity and configuration data is collected. This data includes details of communication with AWS services, use of secure channels, details of the running processes, network traffic among the running processes, and more. The collected data is correlated, analyzed, and compared to a set of security rules specified in the assessment template. A completed assessment run produces a list of findings - potential security problems of various severity.

Show More
Product Format
Product Details
ISBN-13: 9789888407774
ISBN-10: 9888407775
Binding: Hardback or Cased Book (Sewn)
Content Language: English
More Product Details
Page Count: 84
Carton Quantity: 19
Product Dimensions: 8.50 x 0.25 x 11.00 inches
Weight: 1.08 pound(s)
Feature Codes: Illustrated
Country of Origin: US
Subject Information
BISAC Categories
Computers | Distributed Systems - Cloud Computing
Descriptions, Reviews, Etc.
publisher marketing

Amazon Inspector enables you to analyze the behavior of your AWS resources and helps you to identify potential security issues. Using Amazon Inspector, you can define a collection of AWS resources that you want to include in an assessment target. You can then create an assessment template and launch a security assessment run of this target.


During the assessment run, the network, file system, and process activity within the specified target are monitored, and a wide set of activity and configuration data is collected. This data includes details of communication with AWS services, use of secure channels, details of the running processes, network traffic among the running processes, and more. The collected data is correlated, analyzed, and compared to a set of security rules specified in the assessment template. A completed assessment run produces a list of findings - potential security problems of various severity.

Show More
Your Price  $35.61
Hardcover