Categorygithub.com/Invoca/tenable-scan-launcher
module
0.0.0-20220812145648-6006eb2a86d3
Repository: https://github.com/invoca/tenable-scan-launcher.git
Documentation: pkg.go.dev

# README

Tenable-Scan-Launcher Build Status Coverage Status

This scan launcher collects the private IP addresses of Google Cloud and AWS instances and then launches a tenable scan with the option to download the scan as a pdf.

Installation

Installing this repo is as simple as cloning the repo into your $Go/src/github.com directory.

git clone [email protected]:Invoca/tenable-scan-launcher.git

Usage

Running

There are three methods to run the scan launcher. With Docker, the executable file, and in Kubernetes. To run it in kubernetes, modify the manifests in the examples/manifests directory and then apply them.
Docker:

    docker run invoca:SOMETHING   

Shell:

  go build -mod=readonly -o $PWD/tenable-scan-launcher $PWD/cmd/tenable-scan-launcher
  ./tenable-scan-launcher $FLAGS

Flags

The scanner will list private IPs from all regions of each cloud provider given. To enable AWS, include the --include_aws flag. It will use the shared aws configuration settings, so it will use the standard order of precedence for AWS service accounts. To include Google Cloud, use the --include_gcloud flag and be sure to specify the service account file location with --gcloud_json and the desired project with --gcloud_project.

The following Tenable flags are needed to preform a scan:

Reports

FlagDescription
--generate_reportGenerates a report. Supported values are true or false. Defaults to false.
--formatSpecifies the format of the report. Formats are Nessus, HTML, PDF, CSV, or DB. Defaults to empty string
--report-file-locationThe file location to save the file. Default is the empty string.
--chaptersSpecify which chapters of the report to use. Supported chapters are vuln_hosts_summary, vuln_by_host, compliance_exec, remediations, vuln_by_plugin, compliance. Has to be a semi-colon delimited list. Defaults to empty string.
--summary-reportOnly includes the vuln_hosts_summary chapter
--full-reportIncludes all chapters

Note that --summary-report will override --chapters and --full-report overrides --summary-report

Filtering

In order to filter on the severity within the report, include the --[low,medium,high,critical]_severity flags. The search filter can be modified with --search_type. The supported values are and and or. It is not recommended changing it to the and type since each vulnerability can only have a single severity level.

Logging

Log level can be specified with --log-level. The levels are trace, info, fatal, panic, warn, and debug. Log format can be specified with --log-type. The supported types are json, and text.

Contributions

Contributions to this project are always welcome! Please read our Contribution Guidelines before starting any work.

# Packages

No description provided by the author
No description provided by the author