Routine scanning of AWS infrastructure resources for known software vulnerabilities. Newly added resources are automatically discovered and available for scanning. The AWS metadata for scanned AWS infrastructure is available as part of scan results to better enable reporting and decision making.
Continuous scanning and reporting of all AWS resources, and their configuration details, updated automatically with newly added or removed resources.
Detect when AWS accounts and the configuration of deployed resources do not align to security best practices.