Amazon Inspector and AWS Organizations
Amazon Inspector is an automated vulnerability management service that continually scans Amazon EC2 and container workloads for software vulnerabilities and unintended network exposure.
Using Amazon Inspector you can manage multiple accounts that are associated through AWS Organizations by simply delegating an administrator account for Amazon Inspector. The delegated administrator manages Amazon Inspector for the organization and is granted special permissions to perform tasks on behalf of your organization such as:
-
Enable or disable scans for member accounts
-
View aggregated finding data from the entire organization
-
Create and manage suppression rules
For more information, see Managing multiple accounts with AWS Organizations in the Amazon Inspector User Guide.
Use the following information to help you integrate Amazon Inspector with AWS Organizations.
Service-linked roles created when you enable integration
The following service-linked role is automatically created in your organization's management account when you enable trusted access. This role allows Amazon Inspector to perform supported operations within your organization's accounts in your organization.
You can delete or modify this role only if you disable trusted access between Amazon Inspector and Organizations, or if you remove the member account from the organization.
-
AWSServiceRoleForAmazonInspector2
For more information, see Using service-linked roles with Amazon Inspector in the Amazon Inspector User Guide.
Service principals used by the service-linked roles
The service-linked role in the previous section can be assumed only by the service principals authorized by the trust relationships defined for the role. The service-linked roles used by Amazon Inspector grant access to the following service principals:
-
inspector2.amazonaws.com
To enable trusted access with Amazon Inspector
For information about the permissions needed to enable trusted access, see Permissions required to enable trusted access.
Amazon Inspector requires trusted access to AWS Organizations before you can designate a member account to be the delegated administrator for this service for your organization.
When you designate a delegated administrator for Amazon Inspector, Amazon Inspector automatically enables trusted access for Amazon Inspector for your organization.
However, if you want to configure a delegated administrator account using the AWS
CLI or one of the AWS SDKs, then you must explicitly call the
EnableAWSServiceAccess
operation and provide the service principal as a
parameter. Then you can call EnableDelegatedAdminAccount
to delegate the
Inspector administrator account.
You can enable trusted access by running a Organizations AWS CLI command, or by calling an Organizations API operation in one of the AWS SDKs.
Note
If you are using the EnableAWSServiceAccess
API, you need to also call
EnableDelegatedAdminAccount
to delegate the Inspector
administrator account.
To disable trusted access with Amazon Inspector
For information about the permissions needed to disable trusted access, see Permissions required to disable trusted access.
Only an administrator in the AWS Organizations management account can disable trusted access with Amazon Inspector.
You can only disable trusted access using the Organizations tools.
You can disable trusted access by running a Organizations AWS CLI command, or by calling an Organizations API operation in one of the AWS SDKs.
Enabling a delegated administrator account for Amazon Inspector
With Amazon Inspector you can manage multiple accounts in an organization using a delegated administrator with AWS Organizations service.
The AWS Organizations management account designates an account within the organization as the delegated administrator account for Amazon Inspector. The delegated administrator manages Amazon Inspector for the organization and is granted special permissions to perform tasks on behalf of your organization such as: enable or disable scans for member accounts, view aggregated finding data from the entire organization, and create and manage suppression rules
For information on how a delegated administrator manages organization accounts, see Understanding the relationship between administrator and member accounts in the Amazon Inspector User Guide.
Only an administrator in the organization management account can configure a delegated administrator for Amazon Inspector.
You can specify a delegated administrator account from the Amazon Inspector console or API, or by using the Organizations CLI or SDK operation.
Minimum permissions
Only a user or role in the Organizations management account can configure a member account as a delegated administrator for Amazon Inspector in the organization
To configure a delegated administrator using the Amazon Inspector console, see Step 1: Enable Amazon Inspector - Multi-account environment in the Amazon Inspector User Guide.
Note
You must call inspector2:enableDelegatedAdminAccount
in each region where you
use Amazon Inspector.
Disabling a delegated administrator for Amazon Inspector
Only an administrator in the AWS Organizations management account can remove a delegated administrator account from the organization.
You can remove the delegated administrator using either the Amazon Inspector console or API, or
by using the Organizations DeregisterDelegatedAdministrator
CLI or SDK
operation. To remove a delegated administrator using the Amazon Inspector console, see Removing a delegated administrator in the Amazon Inspector User
Guide.