The AWS Inspector integration enables security and compliance teams to continuously monitor vulnerabilities in their AWS environment. It connects Drata to Amazon Inspector so your team can automate vulnerability evidence collection for compliance audits and security posture monitoring.
Key Capabilities
Vulnerability findings (via Amazon Inspector v2)
Filtering by severity, region, and detection date
Automated tests such as “Records of Vulnerability Scans” (mapping to DCF-18)
This integration is used to automate tests such as Records of Vulnerability Scans and Timely Remediation of VLN- findings, helping prove compliance with vulnerability-management and configuration-management policy areas.
Prerequisites & Data Access
Must have Admin, Information Security Lead, DevOps Engineer, or Workspace Manager roles in Drata.
Must have an Admin role in your AWS account.
Must have permissions to create IAM policies and attach policies to roles.
Must use an existing Drata Autopilot Role (
DrataAutopilotRole) in AWS.Drata syncs up to 1,000 new or updated vulnerabilities per day for each connection, sorted by severity (Critical → Low).
Permissions & Data Table
Permission / Scope | Why It’s Needed | Data Accessed (Read Only) |
| Lists configured filters for findings. | Metadata about filters |
| Retrieves AWS Organization member info (if applicable). | Member account data |
| Retrieves overall usage statistics. | Usage metrics |
| Lists coverage statistics across resources. | Coverage data |
| Lists vulnerability findings. | Vulnerability details |
| Retrieves grouped & aggregated findings. | Aggregated finding data |
| Lists resource coverage details. | Resource coverage info |
| Checks status of generated finding reports. | Report metadata |
| Retrieves tags for Inspector resources. | Tag information |
Step-by-Step Setup
Step 1: Create a policy that allows access AWS Inspector.
Sign in to the AWS Console with an account that has permission to create a new role.
Navigate to IAM > Policies, select Create policy.
In the JSON tab, paste the Drata policy (refer to the code-block below)
Choose Next: Tags, add tags if your org uses them.
Choose Next: Review, then enter:
Name:
DrataAwsInspectorPolicyDescription: Provides read-only access for Drata AWS Inspector connection
Click Create policy.
Drata Policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"inspector2:ListFilters",
"inspector2:GetMember",
"inspector2:ListUsageTotals",
"inspector2:ListCoverageStatistics",
"inspector2:ListFindings",
"inspector2:ListFindingAggregations",
"inspector2:ListCoverage",
"inspector2:GetFindingsReportStatus",
"inspector2:ListTagsForResource"
],
"Resource": "*"
}
]
}
Step 2: Attach the Policy to Your Existing AWS Drata Role
In the IAM console, go to Roles.
Locate your current Drata Autopilot Role (
DrataAutopilotRole).Select Add permissions → Attach policies.
Search for and select DrataAwsInspectorPolicy.
Click Attach policy.
During the AWS Inspector connection process, you can choose which vulnerabilities to sync based on severity, AWS region, and detection date. These filters help tailor your sync to your compliance requirements.
Step 3: Copy the Role ARN for Use in Drata
From the role summary page, copy the Role ARN (e.g.,
arn:aws:iam::123456789012:role/DrataAutopilotRole).You’ll paste this value in Drata when completing the connection.
Step 4: Connect AWS Inspector in Drata
In Drata, go to Connections.
Search for AWS Inspector and select it.
Paste the Role ARN you copied from AWS.
Configure the sync settings:
Severity: Choose which levels to include (Critical, High, Medium).
AWS Regions: Select the regions your role has access to.
First Seen On: Drata will sync findings detected on or after this date.
Click Connect to initiate the sync.
Step 5: Verify That Vulnerability Findings Are Syncing
Once connected, Drata automatically begins syncing findings based on your configuration.
Navigate to Vulnerabilities in Drata’s sidebar or select View Findings on the connection page.
Confirm that findings are visible and filtered by severity and region as configured.
Expected Outcome:
You should now see Inspector findings populating in Drata under Vulnerabilities, with severity filters matching your selection.
Important Notes
Supported Version: Amazon Inspector v2 only (Inspector Classic is not supported).
Access Level: Read-only permissions only; no write actions are requested.
Sync Limit: Drata syncs up to 1,000 new or updated findings per day per connection.
Edge Cases:
Removing the attached policy or role breaks the connection.
Ensure the role exists and is active in the regions you select.
For multi-account setups (AWS Organizations), the role must include cross-account access.



