Private
Server IP : 195.201.23.43  /  Your IP : 3.139.239.109
Web Server : Apache
System : Linux webserver2.vercom.be 5.4.0-192-generic #212-Ubuntu SMP Fri Jul 5 09:47:39 UTC 2024 x86_64
User : kdecoratie ( 1041)
PHP Version : 7.1.33-63+ubuntu20.04.1+deb.sury.org+1
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : OFF  |  Sudo : ON  |  Pkexec : ON
Directory :  /lib/python3/dist-packages/awscli/examples/inspector/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /lib/python3/dist-packages/awscli/examples/inspector/describe-rules-packages.rst
**To describe rules packages**

The following ``describe-rules-packages`` command describes the rules package with the ARN of ``arn:aws:inspector:us-west-2:758058086616:rulespackage/0-9hgA516p``::

  aws inspector describe-rules-packages --rules-package-arns arn:aws:inspector:us-west-2:758058086616:rulespackage/0-9hgA516p

Output::

   {
	 "failedItems": {},
	 "rulesPackages": [
	   {
		 "arn": "arn:aws:inspector:us-west-2:758058086616:rulespackage/0-9hgA516p",
		 "description": "The rules in this package help verify whether the EC2 instances in your application are exposed to Common Vulnerabilities and 
		 Exposures (CVEs). Attacks can exploit unpatched vulnerabilities to compromise the confidentiality, integrity, or availability of your service 
		 or data. The CVE system provides a reference for publicly known information security vulnerabilities and exposures. For more information, see 
		 [https://cve.mitre.org/](https://cve.mitre.org/). If a particular CVE appears in one of the produced Findings at the end of a completed 
		 Inspector assessment, you can search [https://cve.mitre.org/](https://cve.mitre.org/) using the CVE's ID (for example, \"CVE-2009-0021\") to 
		 find detailed information about this CVE, its severity, and how to mitigate it. ",
		 "name": "Common Vulnerabilities and Exposures",
		 "provider": "Amazon Web Services, Inc.",
		 "version": "1.1"
	   }
	 ]
   } 

For more information, see `Amazon Inspector Rules Packages and Rules`_ in the *Amazon Inspector* guide.

.. _`Amazon Inspector Rules Packages and Rules`: https://docs.aws.amazon.com/inspector/latest/userguide/inspector_rule-packages.html

Private