No Scan found the issue
- Check permissions in AWS
- Check for the VantaAdditionalPermissions policy to make sure they have the following permissions
"inspector2:BatchGet*",
"inspector2:Get*",
"inspector2:Describe*",
"inspector2:List*"
Permission checks out, but vulnerabilities are still not picked up
- Verify that Inspector is running against the instance
- Go to Inspector then Account Management and select Instances
- The status should be under Running; if not, you must fix the complaints before Inspector runs. We can pick up the Inspector for the instance once Inspector runs.
S3 server access logs enabled failing
- Download the test data. Ensure your Cloud Trail's bucketName is one of the S3 buckets in the list. If not, link it to the existing S3 bucket in that account or connect the account where the S3 bucket lives to Vanta