Amazon Inspector adds Java Gradle support and expands ecosystem coverage

Amazon Inspector adds Java Gradle support and expands ecosystem coverage

Amazon Inspector scanning for Lambda functions and Elastic Container Registry (ECR) images now supports Java Gradle inventory and vulnerability scanning. This release also adds coverage for MySQL, MariaDB, PHP, Jenkins-core, 7zip (on Windows), Elasticsearch, and Curl/LibCurl. This update enhances Amazon Inspector’s ability to detect vulnerabilities and misconfigurations across a broader range of applications and environments. Amazon Inspector is an automated vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure, helping organizations improve their security posture and meet compliance requirements.

The new Java Gradle support allows Inspector to scan Java dependencies based on gradle.lockfile content, providing comprehensive vulnerability assessments for Java applications. When you use Inspector to scan Lambda functions and ECR images, you will now see findings for MySQL, MariaDB, PHP, Jenkins-core, 7zip (on Windows), Elasticsearch, and Curl/LibCurl installations. These enhancements enable more accurate detection of vulnerabilities in packages installed outside of package managers, improving overall security coverage for AWS customers using these technologies.

To learn more about Amazon Inspector and how it can help secure your AWS workloads, visit the Amazon Inspector page. For a full list of Amazon Inspector supported operating systems and programming languages, see the user guide. You can start using these new features today in all AWS Regions where Amazon Inspector is available.

Categories: general:products/amazon-inspector,general:products/aws-govcloud-us,marketing:marchitecture/security-identity-and-compliance

Source: Amazon Web Services



Latest Posts

Pass It On
Leave a Comment

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *