404

[ Avaa Bypassed ]




Upload:

Command:

botdev@18.217.203.133: ~ $
**To describe rules packages**

The following ``describe-rules-packages`` command describes the rules package with the ARN of ``arn:aws:inspector:us-west-2:758058086616:rulespackage/0-9hgA516p``::

  aws inspector describe-rules-packages --rules-package-arns arn:aws:inspector:us-west-2:758058086616:rulespackage/0-9hgA516p

Output::

   {
	 "failedItems": {},
	 "rulesPackages": [
	   {
		 "arn": "arn:aws:inspector:us-west-2:758058086616:rulespackage/0-9hgA516p",
		 "description": "The rules in this package help verify whether the EC2 instances in your application are exposed to Common Vulnerabilities and 
		 Exposures (CVEs). Attacks can exploit unpatched vulnerabilities to compromise the confidentiality, integrity, or availability of your service 
		 or data. The CVE system provides a reference for publicly known information security vulnerabilities and exposures. For more information, see 
		 [https://cve.mitre.org/](https://cve.mitre.org/). If a particular CVE appears in one of the produced Findings at the end of a completed 
		 Inspector assessment, you can search [https://cve.mitre.org/](https://cve.mitre.org/) using the CVE's ID (for example, \"CVE-2009-0021\") to 
		 find detailed information about this CVE, its severity, and how to mitigate it. ",
		 "name": "Common Vulnerabilities and Exposures",
		 "provider": "Amazon Web Services, Inc.",
		 "version": "1.1"
	   }
	 ]
   } 

For more information, see `Amazon Inspector Rules Packages and Rules`_ in the *Amazon Inspector* guide.

.. _`Amazon Inspector Rules Packages and Rules`: https://docs.aws.amazon.com/inspector/latest/userguide/inspector_rule-packages.html


Filemanager

Name Type Size Permission Actions
add-attributes-to-findings.rst File 766 B 0644
create-assessment-target.rst File 777 B 0644
create-assessment-template.rst File 1021 B 0644
create-resource-group.rst File 585 B 0644
delete-assessment-run.rst File 648 B 0644
delete-assessment-target.rst File 551 B 0644
delete-assessment-template.rst File 643 B 0644
describe-assessment-runs.rst File 2.05 KB 0644
describe-assessment-targets.rst File 909 B 0644
describe-assessment-templates.rst File 1.13 KB 0644
describe-cross-account-access-role.rst File 575 B 0644
describe-findings.rst File 1.61 KB 0644
describe-resource-groups.rst File 825 B 0644
describe-rules-packages.rst File 1.61 KB 0644
get-telemetry-metadata.rst File 2.96 KB 0644
list-assessment-run-agents.rst File 6.19 KB 0644
list-assessment-runs.rst File 646 B 0644
list-assessment-targets.rst File 509 B 0644
list-assessment-templates.rst File 667 B 0644
list-event-subscriptions.rst File 985 B 0644
list-findings.rst File 619 B 0644
list-rules-packages.rst File 724 B 0644
list-tags-for-resource.rst File 729 B 0644
preview-agents.rst File 652 B 0644
register-cross-account-access-role.rst File 640 B 0644
remove-attributes-from-findings.rst File 785 B 0644
set-tags-for-resource.rst File 710 B 0644
start-assessment-run.rst File 839 B 0644
stop-assessment-run.rst File 640 B 0644
subscribe-to-event.rst File 744 B 0644
unsubscribe-from-event.rst File 761 B 0644
update-assessment-target.rst File 808 B 0644