AWS Inspector

Version: 1.3
Updated: July 29, 2025
Amazon Inspector enables you to analyze the behavior of your AWS resources and to identify potential security issues.
Actions
- List Assessment Target (Enrichment) - Lists the ARNs of the assessment targets within this AWS account.
- List Assessment Template (Enrichment) - Lists the assessment templates that correspond to the assessment targets that are specified by the ARNs of the assessment targets.
- List Rules Package (Enrichment) - Lists all available Amazon Inspector rules packages.
- Create Assessment Target (Containment) - Creates a new assessment target using the ARN of the resource group that is generated by CreateResourceGroup.
- Create Assessment Template (Containment) - Creates an assessment template for the assessment target that is specified by the ARN of the assessment target.
- Delete Assessment Target (Containment) - Deletes the assessment target that is specified by the ARN of the assessment target.
Configure AWS Inspector in Automation Service and Cloud SOAR
Before you can use this automation integration, you must configure its authentication settings so that the product you're integrating with can communicate with Sumo Logic. For general guidance, see Configure Authentication for Automation Integrations.
How to open the integration's configuration dialog
- Access App Central and install the integration. (You can configure at installation, or after installation with the following steps.)
- Go to the Integrations page.
Classic UI. In the main Sumo Logic menu, select Automation and then select Integrations in the left nav bar.
New UI. In the main Sumo Logic menu, select Automation > Integrations. You can also click the Go To... menu at the top of the screen and select Integrations. - Select the installed integration.
- Hover over the resource name and click the Edit button that appears.
In the configuration dialog, enter information from the product you're integrating with. When done, click TEST to test the configuration, and click SAVE to save the configuration:
-
Label. Enter the name you want to use for the resource.
-
Access Key ID. Enter an AWS access key ID to provide authentication. (Although AWS recommends using IAM roles with temporary security credentials instead of access keys.)
-
Secret Access Key. Enter the secret access key associated with the access key ID.
-
IAM Role. Enter an AWS IAM Role ARN to provide authentication. See the AWS documentation on IAM identifiers for more information.
-
AWS Region. Enter your AWS region.
-
Automation Engine. Select Cloud execution for this certified integration. Select a bridge option only for a custom integration. See Cloud or Bridge execution.
-
Proxy Options. Select whether to use a proxy. (Applies only if the automation engine uses a bridge instead of cloud execution.)
- Use no proxy. Communication runs on the bridge and does not use a proxy.
- Use default proxy. Use the default proxy for the bridge set up as described in Using a proxy.
- Use different proxy. Use your own proxy service. Provide the proxy URL and port number.

For information about AWS Inspector, see Inspector documentation.
For configuration information specific to AWS integrations, see the AWS integrations section.
AWS IAM role-based access
To enable AWS IAM role-based authentication without sharing access keys and secrets, follow the steps below:
- Create an IAM role in your AWS account. Follow AWS’s guide to create a new IAM role.
- Attach required policies to the role depending on the AWS services you want to allow access to (for example,
AmazonEC2ReadOnlyAccess
,AWSWAFFullAccess
, etc.). - Update the trust policy to allow Sumo Logic’s AWS account to assume this role. This involves editing the trust relationship JSON to include Sumo Logic’s AWS account ID as a trusted principal.
Example trust policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::<sumo-account-id>:root"
},
"Action": "sts:AssumeRole"
}
]
}
Limitations
Local Automation Bridge is not supported in this version.
Change Log
- March 2, 2022 - First upload
- March 10, 2022 - Logo
- June 15, 2023 (v1.2) - Updated the integration with Environmental Variables
- July 29, 2025 (v1.3) - Added support for IAM role authentication - Users can now authenticate using an AWS IAM Role in addition to access key–based authentication.