Add ec2 roles credentials.
This commit is contained in:
		
							
								
								
									
										32
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										32
									
								
								README.md
									
									
									
									
									
								
							@@ -1064,8 +1064,36 @@ With this sample command, it will ..
 | 
			
		||||
## Example: Put results in S3 bucket
 | 
			
		||||
To put results in S3 bucket, configure following settings in AWS before reporting.
 | 
			
		||||
- Create S3 bucket. see [Creating a Bucket](http://docs.aws.amazon.com/AmazonS3/latest/UG/CreatingaBucket.html)  
 | 
			
		||||
- Create access key. The access key must have read and write access to the AWS S3 bucket. see [Managing Access Keys for IAM Users](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html)
 | 
			
		||||
- Configure the security credentials. see [Configuring the AWS Command Line Interface](http://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html)
 | 
			
		||||
- Configure access to S3 resources. You can do this in several ways:
 | 
			
		||||
  - Configure the environment variables. see [Configuring the AWS Command Line Interface](http://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html)
 | 
			
		||||
  - Configure the security credentials. see [Configuring the AWS Command Line Interface](http://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html)
 | 
			
		||||
  - Create an IAM role for the service and attach it to the service(EC2, AWS Lambda). [Creating a Role to Delegate Permissions to an AWS Service](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-service.html)
 | 
			
		||||
- To configure environment variables, security credentials, create an access key. see [Managing Access Keys for IAM Users](http://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html)
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
Example of IAM policy:
 | 
			
		||||
 | 
			
		||||
```
 | 
			
		||||
{
 | 
			
		||||
    "Version": "2012-10-17",
 | 
			
		||||
    "Statement": [
 | 
			
		||||
        {
 | 
			
		||||
            "Effect": "Allow",
 | 
			
		||||
            "Action": [
 | 
			
		||||
                "s3:ListAllMyBuckets"
 | 
			
		||||
            ],
 | 
			
		||||
            "Resource": "arn:aws:s3:::*"
 | 
			
		||||
        },
 | 
			
		||||
        {
 | 
			
		||||
            "Effect": "Allow",
 | 
			
		||||
            "Action": [
 | 
			
		||||
                "s3:PutObject"
 | 
			
		||||
            ],
 | 
			
		||||
            "Resource": "arn:aws:s3:::vuls/*"
 | 
			
		||||
        }
 | 
			
		||||
    ]
 | 
			
		||||
}
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
```
 | 
			
		||||
$ vuls report \
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user