menu
{ "item_title" : "Amazon Inspector User Guide", "item_author" : [" Documentation Team "], "item_description" : "Amazon Inspector enables you to analyze the behavior of your AWS resources and helps you to identify potential security issues. Using Amazon Inspector, you can define a collection of AWS resources that you want to include in an assessment target. You can then create an assessment template and launch a security assessment run of this target. During the assessment run, the network, file system, and process activity within the specified target are monitored, and a wide set of activity and configuration data is collected. This data includes details of communication with AWS services, use of secure channels, details of the running processes, network traffic among the running processes, and more. The collected data is correlated, analyzed, and compared to a set of security rules specified in the assessment template. A completed assessment run produces a list of findings - potential security problems of various severity.", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/9/88/840/777/9888407775_b.jpg", "price_data" : { "retail_price" : "29.99", "online_price" : "29.99", "our_price" : "29.99", "club_price" : "29.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Amazon Inspector User Guide|Documentation Team

Amazon Inspector User Guide

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Amazon Inspector enables you to analyze the behavior of your AWS resources and helps you to identify potential security issues. Using Amazon Inspector, you can define a collection of AWS resources that you want to include in an assessment target. You can then create an assessment template and launch a security assessment run of this target.


During the assessment run, the network, file system, and process activity within the specified target are monitored, and a wide set of activity and configuration data is collected. This data includes details of communication with AWS services, use of secure channels, details of the running processes, network traffic among the running processes, and more. The collected data is correlated, analyzed, and compared to a set of security rules specified in the assessment template. A completed assessment run produces a list of findings - potential security problems of various severity.

This item is Non-Returnable

Details

  • ISBN-13: 9789888407774
  • ISBN-10: 9888407775
  • Publisher: Samurai Media Limited
  • Publish Date: June 2018
  • Dimensions: 11 x 8.5 x 0.25 inches
  • Shipping Weight: 1.08 pounds
  • Page Count: 84

Related Categories

You May Also Like...

    1

BAM Customer Reviews