By registering AWS authentication information in FutureVuls, you can update EC2 packages via SSM (AWS Systems Manager). You can update them from the FutureVuls screen on a task-by-task basis. The results of commands issued via SSM can be confirmed in the SSM Command History
.
Complete the AWS authentication information settings beforehand.
AmazonSSMManagedInstanceCore
policy (AWS Documentation)sudo yum -y install amazon-ssm-agent
(For Amazon Linux; refer to the above documentation for other OSes)sudo systemctl start amazon-ssm-agent
(For Amazon Linux; refer to the above documentation for other OSes)Managed Instances
in AWS System Manager.Click the Set Up
button on the AWS integration page in the Group settings.
Run the command (AWS CLI) that appears (FutureVulsSSMPkgSetting.sh) in an environment where AWS CLI is installed and configured (requires the permissions ssm.CreateDocument
and ssm.DeleteDocument
) and click Next.
If SSM-Integrated Package Update
is set to Configured
, it is complete.
After the above SSM settings, the information on whether each server can be integrated with SSM or not will be imported into FutureVuls at the timing of the scan. If the SSM integration
column in the server list is set to ○
, the setup is complete.
![image](https://user-images.githubusercontent.com/899733