By registering AWS authentication information in FutureVuls, you can update EC2 packages via SSM (AWS Systems Manager). You can update them from the FutureVuls screen on a task-by-task basis. The results of commands issued via SSM can be confirmed in the
SSM Command History.
Complete the AWS authentication information settings beforehand.
sudo yum -y install amazon-ssm-agent(For Amazon Linux; refer to the above documentation for other OSes)
sudo systemctl start amazon-ssm-agent(For Amazon Linux; refer to the above documentation for other OSes)
Managed Instancesin AWS System Manager.
Set Up button on the AWS integration page in the Group settings.
Run the command (AWS CLI) that appears (FutureVulsSSMPkgSetting.sh) in an environment where AWS CLI is installed and configured (requires the permissions
ssm.DeleteDocument) and click Next.
SSM-Integrated Package Update is set to
Configured, it is complete.
After the above SSM settings, the information on whether each server can be integrated with SSM or not will be imported into FutureVuls at the timing of the scan. If the
SSM integration column in the server list is set to
○, the setup is complete.