Beacon scans for security vulnerabilities across various AWS services, including:
We run scans for a variety of security and infrastructure vulnerabilities, including:
It's as simple as typing `perform security scan` in a command that @-mentions the Beacon bot, or a DM.
It's easy to get started using the Beacon bot. Once you add the Beacon slack extension, a bot with an @beacon username will be added to your workspace. We'll create a channel where the Beacon bot will post its automated scan results and have you point us at the AWS infrastructure you'd like us to scan. Within 5 minutes, you'll be ready to scan for vulnerabilities on-demand and automatically.
The Beacon bot scans our AWS infrastructure for security vulnerabilities by leveraging read-only audit access to your AWS account. When you add Beacon Bot, we'll guide you through the creation of a CloudFormation stack. This is a straightforward process that you only takes a few clicks. This stack creates an IAM Role that gives the bot read-only permissions to your AWS account. Beacon can't configure, create, or delete things in your account. You can remove the access you have granted at any time by deleting the stack that is created.
Nope. We won't make any changes to your existing infrastructure, nor add nor remove any components.
By default, the Beacon bot will create a new channel, #beacon_scans, and post its results there. You can change the channel where it posts the scans results from its automated scans at any time using the `configure` command.