Posture Control (ZPC)
Integrating Vulnerability Management for Amazon Web Services Workloads
Zscaler Posture Control (ZPC) enables you to integrate the vulnerability management for your Amazon Web Services (AWS) cloud accounts. The integration allows ZPC to scan the Windows and Linux cloud workloads for known security vulnerabilities and display the scan results in the ZPC Admin Portal, so you can remediate the vulnerabilities.
ZPC supports the vulnerability scanning of AWS cloud workloads located in the following regions:
- List of Supported Regions
- US East(N. Virginia) us-east-1
- US East(Ohio) us-east-2
- US West(N. California) us-west-1
- US West(Oregon) us-west-2
- Africa(Cape Town) af-south-1
- Asia Pacific(Hong Kong) ap-east-1
- Asia Pacific(Mumbai) ap-south-1
- Asia Pacific(Osaka) ap-northeast-3
- Asia Pacific(Seoul) ap-northeast-2
- Asia Pacific(Singapore) ap-southeast-1
- Asia Pacific(Sydney) ap-southeast-2
- Asia Pacific(Tokyo) ap-northeast-1
- Canada(Central) ca-central-1
- Europe(Frankfurt) eu-central-1
- Europe(Ireland) eu-west-1
- Europe(London) eu-west-2
- Europe(Milan) eu-south-1
- Europe(Paris) eu-west-3
- Europe(Stockholm) eu-north-1
- Middle East(Bahrain) me-south-1
- South America(São Paulo) sa-east-1
Prerequisites
You must first onboard your AWS cloud accounts before configuring specific accounts and organizations for vulnerability scanning. To learn more, see Onboarding an Amazon Web Services Account.
To integrate the vulnerability management for AWS workloads:
- Go to Administration > Container Registries & Workloads.
- Click Add Integration.
- Under General Information:
- For Vulnerability Scanning Type, select Cloud Workloads.
- For Cloud Type, select Amazon Web Services.
- Click Next.
- Under Account Selection:
- Accounts: Select the individual accounts that must be configured for scanning. Use the Search field to search for specific accounts in the list.
- Organizations: Select the accounts within a specific organization that must be configured for scanning.
- Click Finish.
A message is displayed indicating that the vulnerability management integration is successful. You can set up the vulnerability scanning rule and schedule the scan to run at regular intervals. To learn more, see Adding a Vulnerability Scanning Rule for Cloud Workloads.