Skip to main content
McAfee MVISION Cloud

Create a Vulnerability Scan for AWS

Prerequisites

The following minimum permissions are needed in the RoleARN policy JSON:

"ecr:GetAuthorizationToken",
"ecr:ListImages",
"ecr:BatchGetImage",
"ecr:DescribeImages",
"ecr:DescribeRepositories",
"ecr:GetRepositoryPolicy",
"ecr:BatchCheckLayerAvailability",
"ecr:GetDownloadUrlForLayer",
"ec2:DescribeRegions"

Any existing RoleARN policy can be modified and the corresponding RoleARN can be linked with CVS scans.

Configure a Vulnerability Scan

Perform the following activities to configure a Vulnerability Scan:

  1. Choose Policy > On-Demand Scan.
  2. Click Actions > Create a Scan.
  3. The Scan Creation Wizard is displayed. On the General Info page enter the following:
    • Scan Type. Select Vulnerability.
    • Name. Enter a unique identifier so that you can rerun the scan later.
    • Description. Enter an optional description for the scan. 
    • Service Instance. Select the cloud service instance you want to scan.
      aws_cvs_1.png
  4. Click Next
  5. The Select Policies page displays the active Vulnerability policies. Select the policies you want to use, and click Next.
    aws_cvs_2.png
  6. On the Configure Scan page, select Container Images or VM Instances, and configure the scope of your scan.
    vulnerability_scan_container_images_5.3.2.png
    • For Container Images:
      • Images:
        • Data Scope
          • Full. Scans all images every time the scan is run.
          • Incremental. Scan only those images that have added/modified since the last successful scan. 
          • Scan Dates. Select All, to scan all dates. Or select Last X Days to limit the scan to the specified time period. 
      • Repositories: 
        • All Repositories. Scan all repositories.
        • Include Specific Repositories. To include specific repositories for scan, enter the applicable repositories using the following choices. 
        • Exclude Specific Repositories. To exclude specific repositories for scan, enter the applicable repositories using the following choices. 
          • Use a Predefined Dictionary. Select a Predefined Dictionary from the drop-down list. For more information, see this topic.
          • Manually enter Repositories. Manually enter the repositories in the textbox which needs to be scanned. You can enter multiple repositories separated by a space, or comma.
            clipboard_e39093839b3254e1ba10c2c0601320511.png
        • Vulnerability Severity Levels. Vulnerability Severity Levels specifies the severity of the CVEs to be reported in the incidents. CVE severities have the following classifications: 
          • High, Medium, or Low. If level High is selected, it implies that all the CVEs with a severity classification of High and above will be reported in the generated incidents. Similarly, selecting level Low reports all the CVEs above Low including Medium, High, and above in the generated incidents.

NOTE: An incident is generated per image. So, if there are three images specified in the scan, then three incidents might be generated. But, if the Common Vulnerabilities and Exposures (CVEs) found in an image are below the selected Vulnerability Severity Level, then those are not be included in the generated incidents. Also, if an image doesn't have a CVE or is above the selected Severity Levels, no incidents are generated for that image.
clipboard_edd575ef40db2f3bd3b24047c135acdcd.png

  • Accounts:
    • All Accounts. Scan all accounts. 
    • Include Specific Accounts. To include only specific accounts, click Edit and select the applicable Account checkbox. 
    • Exclude Specific Accounts. To exclude only specific accounts, click Edit and select the applicable Account checkbox.
      clipboard_eb318f5f105e387a84236324c86851af0.png 
  • For VM Instances:
    • Scan Containers in Instances. Select to also scan containers within a VM for vulnerabilities. This only identifies vulnerabilities that are introduced into the runtime containers in comparison to what is identified in the image.
    • Accounts:
      • All Accounts. Scan all accounts. 
      • Include Specific Accounts. To include only specific accounts, click Edit and select the applicable Account checkbox. 
      • Exclude Specific Accounts. To exclude only specific accounts, click Edit and select the applicable Account checkbox.
    • Tags. Select any tags you want to use for your rule, and enter the key-value pair. 
      vulnerability_scan_vm_5.3.2.png
  1. Click Next
  2. On the Schedule Scan page, select the schedule to run your scan and click Next:
    • None (On-Demand Only). Run the scan once now.
    • Daily. Run the scan once a day. Configure the time and time zone. 
    • Weekly. Run the scan once a week. Configure the day, time, and time zone.
      clipboard_edd2399d0f442720aea132aeba36b70d7.png 
  3. On the Review and Activate page, review your settings for the On-Demand Scan, and click Save. Click Back to make changes. 

When a scan is complete, you can view the results or return to scan on the Policy > On-Demand Scan page.

You can view policy incident violations on the Policy > Policy Incidents page. Filter for Incident Type > Vulnerability Violation

  • Was this article helpful?