Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
53 changes: 53 additions & 0 deletions docs/12-Security-hub/aws-container-security-scan.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,53 @@
---
sidebar_position: 3
---

# AWS Container Security Scan

## Overview

The AWS Container Security Scan is a powerful feature that allows you to comprehensively assess the security of your container images. As containers play a critical role in modern application deployment, ensuring their security becomes of utmost importance. This scan is designed to identify vulnerabilities within your container images, thereby facilitating secure and reliable software deployment across your infrastructure.

## Usage

Here's a step-by-step guide on how to effectively perform an AWS Container Security Scan:

1. **Access the Container Security Scan:**
Within the Cloud and Source Code Account Insights feature, navigate to the "Container Security Scan" option. This option is your gateway to initiating security scans on your container images.

![Access Container Security Scan](././../../static/img/security-hub/aws-container-1.png)

2. **Choose Repositories:**
Select one or more repositories from which you intend to retrieve container image tags. Only the image tags you select will undergo the scanning process. This selective approach allows you to focus on specific areas of interest.

![Choose Repositories](././../../static/img/security-hub/aws-container-2.png)

3. **Tag Selection:**
To customize your scan, utilize the drop-down menus provided to choose specific image tags for scanning. If preferred, you can opt to scan all repositories by using the provided checkbox. This flexibility ensures that you can adapt the scan to your specific needs.

![Tag Selection](././../../static/img/security-hub/aws-container-3.png)

4. **Initiate the Scan:**
Once your repositories and tags are chosen, kick off the scan by clicking on the "Run" button. This action sets the scan process in motion, where each selected container image tag will be scrutinized for potential security vulnerabilities.

5. **View Results:**
After the scan completes, a detailed and comprehensive report will be generated. This report presents the findings of the scan, highlighting any detected security vulnerabilities within the scanned container images. This information provides you with valuable insights to take informed actions.

![View Results](././../../static/img/security-hub/aws-container-4.png)

6. **Address Vulnerabilities:**
Armed with the scan results, review the report to gain a clear understanding of the identified vulnerabilities. Depending on the severity of the vulnerabilities, take appropriate actions to mitigate risks. This could involve updating container images, applying patches, or implementing security best practices to ensure your applications remain secure.

![Address Vulnerabilities](././../../static/img/security-hub/aws-container-5.png)

By following these straightforward steps, you can leverage the capabilities of the AWS Container Security Scan to bolster the security of your containerized applications. This feature equips you with the insights needed to make informed decisions, enabling you to deliver applications that are not only functional but also robust and resilient in the face of potential security threats.










58 changes: 58 additions & 0 deletions docs/12-Security-hub/aws-security-scan.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
---
sidebar_position: 2
---

# AWS Security Scan

## Overview

The AWS Security Scan is a fundamental feature within the Cloud and Source Code Account Insights toolkit. This tool empowers users to proactively evaluate the security status of their AWS accounts by identifying potential vulnerabilities.

By leveraging this scan, users can gain crucial insights into their AWS resources' security posture, enabling them to make informed decisions and improve overall security.

## Purpose

The AWS Security Scan serves as a proactive measure to identify security weaknesses within your AWS account. By conducting comprehensive security vulnerability assessments, this scan assists in pinpointing potential threats and vulnerabilities that may expose your AWS resources to risks.

The scan provides users with actionable insights to address these vulnerabilities promptly, enhancing the overall security and resilience of your AWS infrastructure.

## Usage

Utilizing the AWS Security Scan is straightforward and involves the following steps:

### 1. Access the AWS Security Scan

- Start by navigating to the **Cloud and Source Code Account Insights** feature within your dashboard. This is typically accessible from the main menu or a designated security section of your user interface.

![Access the AWS Security Scan](././../../static/img/security-hub/aws-sec-scan-1.png)

### 2. Initiate the Scan

- Once you are within the **Cloud and Source Code Account Insights** section, locate and click on the "Run" or "Initiate Scan" button to start the AWS Security Scan process. The scan will automatically run a series of tests against your AWS account, comparing its configuration and setup against established security rules repositories.

![Initiate the AWS Security Scan](././../../static/img/security-hub/aws-sec-scan-4.png)

### 3. Review Results

- After the scan is completed, which typically takes less than 2 minutes, a comprehensive report will be generated. This report provides detailed insights into the security vulnerabilities that have been detected within your AWS account. The report may include information about specific vulnerabilities, their severity, affected resources, and suggested remediation steps.

![Review Scan Results](././../../static/img/security-hub/aws-sec-scan-2.png)

### 4. Remediation

- Based on the information provided in the scan report, take proactive actions to address the identified vulnerabilities. This might involve applying necessary security patches, adjusting security group configurations, enhancing access controls, or reviewing identity and access management policies. The goal is to mitigate the detected vulnerabilities and strengthen the overall security posture of your AWS resources.

![Address Vulnerabilities](././../../static/img/security-hub/aws-sec-scan-3.png)

## Benefits

The AWS Security Scan offers several notable benefits:

- **Proactive Security Assessment:** Conduct regular scans to proactively identify and address security vulnerabilities within your AWS account before they can be exploited.
- **Timely Insights:** The scan typically takes less than 2 minutes, providing you with quick results to ensure timely response and remediation.
- **Actionable Reports:** The generated reports offer detailed insights into vulnerabilities, aiding in effective remediation planning.
- **Enhanced Security Posture:** By addressing identified vulnerabilities, you can bolster the security of your AWS resources, ensuring compliance and reducing risks.

## Conclusion

The AWS Security Scan is a vital tool that empowers users to take control of their AWS account's security. By identifying and addressing potential vulnerabilities, you can bolster your infrastructure's security, enhance compliance, and build a more resilient AWS environment. Incorporate the AWS Security Scan into your security practices to proactively safeguard your AWS resources.
82 changes: 82 additions & 0 deletions docs/12-Security-hub/overview.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,82 @@
---
sidebar_position: 1
---

# Overview

import DocCardList from '@theme/DocCardList';

# Cloud and Source Code Account Insights Feature Documentation

Welcome to the documentation for the Cloud and Source Code Account Insights feature. This powerful tool allows you to gain valuable insights about your cloud and source code accounts in under 2 minutes, enabling you to uncover hidden truths about cost, security, and compliance.

This documentation will walk you through the features and steps to utilize this tool effectively.

## Table of Contents


1. [AWS Security Scan](#aws-security-scan)
- [Overview](#overview)
- [Usage](#usage)
2. [AWS Container Security Scan](#aws-container-security-scan)
- [Overview](#overview-1)
- [Usage](#usage-1)


![Security Hub Overview](././../../static/img/security-hub/security-hub-overview.png)


## 1. AWS Security Scan

### Overview

The AWS Security Scan is a key component of the Cloud and Source Code Account Insights feature. It allows you to perform security vulnerability assessments on your AWS account. By identifying potential security weaknesses, this scan provides you with crucial information that can be used to enhance the security posture of your AWS resources.

### Usage

To utilize the AWS Security Scan:

1. **Access the AWS Security Scan:** Navigate to the Cloud and Source Code Account Insights feature within your dashboard.

2. **Initiate the Scan:** Click on the "Start Scan" button. The scan will run a series of tests against your AWS account, evaluating it against leading security rules repositories.

3. **Review Results:** After the scan is complete (usually within 2 minutes), a detailed report will be generated. This report will highlight security vulnerabilities that have been detected within your AWS account.

4. **Remediation:** Based on the scan results, take appropriate actions to address the identified vulnerabilities. This may involve applying security patches, updating configurations, or adjusting permissions.

## 2. AWS Container Security Scan

### Overview

The AWS Container Security Scan allows you to assess the security of your container images. Containers are a vital component of modern application deployment, and ensuring their security is paramount. This scan enables you to identify vulnerabilities within your container images, promoting secure and reliable software deployment.

### Usage

To perform an AWS Container Security Scan:

1. **Access the Container Security Scan:** Within the Cloud and Source Code Account Insights feature, select the "Container Security Scan" option.

2. **Choose Repositories:** Choose one or more repositories from which you wish to fetch container image tags. Only the selected tags will be scanned.

3. **Tag Selection:** Utilize the drop-down menus to select specific image tags for scanning. Alternatively, you can choose to scan all repositories by using the provided checkbox.

4. **Initiate the Scan:** Click on the "Scan" button to start the container image scan process.

5. **View Results:** Once the scan is complete, a comprehensive report will be generated. This report will detail any security vulnerabilities found within the scanned container images.

6. **Address Vulnerabilities:** Review the scan results and take appropriate actions to address any identified vulnerabilities. This may involve updating container images, applying patches, or implementing security best practices.

By following these steps, you can make the most of the AWS Container Security Scan to enhance the security of your containerized applications.

---

With the Cloud and Source Code Account Insights feature, you have the power to uncover hidden truths about cost, security, and compliance within your cloud and source code accounts. By utilizing the AWS Security Scan and AWS Container Security Scan, you can proactively enhance the security and reliability of your resources. This feature is designed to empower you to take informed actions that contribute to the overall success of your projects.

Use the tools below to get insights about your cloud and source code accounts in less than 2 minutes.

Find out hidden truths about cost, security and compliance.




<DocCardList />
Binary file added static/img/security-hub/aws-container-1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/img/security-hub/aws-container-2.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/img/security-hub/aws-container-3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/img/security-hub/aws-container-4.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/img/security-hub/aws-container-5.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/img/security-hub/aws-sec-scan-1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/img/security-hub/aws-sec-scan-2.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/img/security-hub/aws-sec-scan-3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/img/security-hub/aws-sec-scan-4.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading