Introduction to Amazon Inspector
Posted on September 3, 2025 • 6 min read • 1,275 wordsA clear and practical overview of Amazon Inspector, AWS's vulnerability assessment service for EC2, ECR, and Lambda.

Amazon Inspector is an automated vulnerability management service on AWS that automatically discovers workloads such as EC2 instances, container images in ECR, and Lambda functions, and continuously scans them for software vulnerabilities and unexpected network exposures.
It generates findings used to prioritize patches based on a contextualized risk score, which adapts the CVSS score according to the environment (e.g., absence of open ports).
Amazon Inspector automatically detects eligible resources as soon as they are created or modified (packages, configuration, or new CVEs published).
It offers low-impact scans, unlike traditional tools.
The Amazon Inspector risk score adjusts the NVD base score based on the runtime environment. It helps prioritize exploitable vulnerabilities over low-risk ones.
With AWS Organizations integration, you can assign a delegated administrator account to activate and manage scans across all member accounts. It aggregates results and manages findings and configurations.
Findings are published to Amazon EventBridge, enabling automated workflows (SNS, Lambda, etc.). If AWS Security Hub is enabled, findings are also sent there for centralized monitoring.
The Amazon Inspector risk score is a contextualized prioritization evaluation that improves the traditional CVSS score by adding AWS-specific environmental context.
Amazon Inspector starts by leveraging the Common Vulnerability Scoring System (CVSS), typically provided by the NVD (National Vulnerability Database). This score ranges from 0.0 to 10.0, and measures vulnerability severity based on:
However, this score does not reflect the real-world context of the affected resource.
This is where Amazon Inspector excels. It enriches the CVSS score with AWS-specific information related to the affected resource, such as:
| Analyzed Element | Typical Impact on Score |
|---|---|
| Network exposure | Open ports, public accessibility via Security Groups or ACLs → increased score. |
| Vulnerable process present | Package is installed but not running → reduced score. |
| Resource type | Vulnerabilities on Lambda or EC2 vary in severity based on permissions/context. |
| Associated IAM permissions | Sensitive roles (S3, Secrets Manager, etc.) → increased score. |
| Known exploit path | Publicly available exploits or direct attack vectors → boosted score. |
The final score is not just a raw CVSS score, but a dynamic score between 0 and 10, calculated for each finding.
It comes with a criticality level:
INFORMATIONAL (score = 0)LOW (score > 0 and < 4)MEDIUM (score ≥ 4 and < 7)HIGH (score ≥ 7 and < 9)CRITICAL (score ≥ 9 and ≤ 10)This score reflects both the intrinsic severity and actual exploitability of the vulnerability in your environment.

Imagine an EC2 instance with a vulnerable library scored 9.8 on the CVSS scale:
| Criteria | Amazon Inspector | GuardDuty | Inspector Classic (legacy) |
|---|---|---|---|
| Scanned Resources | EC2, ECR, Lambda | API traffic, AWS logs | EC2 only |
| Detection Type | Software vulnerabilities & network issues | Suspicious activities & threats | Periodic audits, dedicated agent |
| SSM/Organizations Support | ✔ SSM / AWS Organizations | ✘ | Limited to single account |
| Contextual Scoring | ✔ CVSS score adjusted based on context | — | Raw score |
| Deployment | Agent via SSM or agentless | Agentless, quick setup | Dedicated agent, heavier setup |
For DevOps professionals familiar with Google Cloud Platform, Amazon Inspector can be seen as a service combining the capabilities of Container Scanning in Artifact Registry, Security Command Center, and Cloud Security Scanner. However, its logic is fully rooted in AWS primitives: AWS Systems Manager (SSM), Amazon EventBridge, Security Hub, and AWS Organizations.
In GCP, security analysis is typically triggered during CI/CD steps or upon image import into Artifact Registry. In contrast, Amazon Inspector performs continuous scanning on:
Another key difference is that Inspector introduces a contextualized risk score, which dynamically adjusts the CVSS base score according to actual exposure (open ports, IAM role, network accessibility, etc.). By comparison, GCP tools often assign a raw CVSS score without considering runtime context.
Thanks to EventBridge, you can configure a fully automated workflow:
This kind of native orchestration is smoother than with equivalent GCP tools, which often require custom scripts or third-party integrations.
GCP uses folders and projects to enable modular management, but this requires fine-grained and sometimes repetitive IAM configuration. Amazon Inspector, via AWS Organizations, allows you to assign a delegated administrator account to manage all member accounts. This central account handles:
This leads to simpler and more centralized governance, especially helpful in large-scale environments.
Finally, note that IAM permissions management differs: AWS allows for more granular delegation per resource, using conditional policies (by tags, IP, time-of-day, etc.). This enables more precise and dynamic security control, which is especially useful in multi-team environments.
Amazon Inspector is a robust and professional-grade tool for managing software vulnerabilities on AWS, offering clear benefits in terms of automation, smart prioritization, deep AWS integration, and multi-account support. It is especially well-suited for DevOps and security teams, as well as regulated industries.