Skip to content

AWS Scanner

The AWS Scanner queries AWS cryptographic services to inventory certificates, encryption keys, and signing credentials managed by AWS.

AWS managed cryptographic services:

  • ACM (AWS Certificate Manager) — TLS certificates for AWS services
  • KMS (Key Management Service) — Encryption keys (symmetric and asymmetric)
  • IAM — Server certificates and user signing certificates
  1. Authenticates to AWS using provided credentials or IAM role
  2. Queries each configured service in the specified region
  3. ACM: Lists and describes all certificates, including domain names, status, and key algorithm
  4. KMS: Lists keys and retrieves metadata — key spec, usage, state, rotation status
  5. IAM: Lists server certificates and user signing certificates
  6. Maps AWS-specific metadata to normalized CBOM asset format
scanners:
aws:
- region: us-east-1
services:
- acm
- kms
- iam
accessKeyId: AKIA...
secretAccessKey: "..."
# Or use IAM role (no credentials needed if running on EC2/ECS)
ParameterRequiredDefaultDescription
regionYesAWS region to scan
servicesYesList of services: acm, kms, iam
accessKeyIdNoAWS access key (omit if using IAM role)
secretAccessKeyNoAWS secret key (omit if using IAM role)

Authentication options:

  1. Explicit credentials (accessKeyId + secretAccessKey)
  2. IAM instance role (when running on EC2/ECS — no credentials needed)
  3. Environment variables (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY)
Asset TypeWhat’s Captured
certificateARN, domain names, issuer, expiry, key algorithm, status, type (imported/issued)
symmetric-keyKey ID, key spec (SYMMETRIC_DEFAULT), key usage, key state, rotation status
public-keyKey ID, key spec (RSA_2048, ECC_NIST_P256), key usage, key state
FieldDescription
Certificate ARNUnique AWS resource identifier
Domain namesPrimary + SANs
IssuerAmazon or imported CA
Key algorithmRSA-2048, ECDSA-P256, etc.
StatusISSUED, PENDING_VALIDATION, EXPIRED, REVOKED
In use byAssociated AWS resources (ELB, CloudFront, etc.)
FieldDescription
Key IDUnique key identifier
Key specRSA_2048, ECC_NIST_P256, SYMMETRIC_DEFAULT, etc.
Key usageENCRYPT_DECRYPT, SIGN_VERIFY
Key stateEnabled, Disabled, PendingDeletion
RotationWhether automatic rotation is enabled
FieldDescription
Server certificatesCertificates uploaded for ELB/CloudFront
Signing certificatesX.509 certificates associated with IAM users
Associated userIAM user the certificate belongs to
  • ACM certificates: SHA-256 of certificate ARN (unique per region)
  • KMS keys: Key ID (globally unique)
  • IAM certificates: Certificate ID
  • Inventory all AWS-managed cryptographic material across regions
  • Find expiring ACM certificates before they affect production load balancers
  • Audit KMS key rotation — identify keys without automatic rotation enabled
  • Discover orphaned IAM certificates that are no longer in use
{
"type": "certificate",
"fingerprint": "sha256:a7b8c9d0e1f2...",
"subject": "CN=*.example.com",
"issuer": "CN=Amazon, O=Amazon, C=US",
"signatureAlgorithm": "SHA256withRSA",
"notValidAfter": "2025-06-15T00:00:00Z",
"status": "ISSUED",
"san": ["*.example.com", "example.com"],
"source": {
"scanner": "aws",
"service": "acm",
"region": "us-east-1",
"arn": "arn:aws:acm:us-east-1:123456789:certificate/abc-123",
"inUseBy": ["arn:aws:elasticloadbalancing:us-east-1:123456789:loadbalancer/app/prod-alb/abc123"]
}
}
{
"type": "symmetric-key",
"fingerprint": "sha256:kms-key-id-hash...",
"algorithm": "AES",
"keySize": 256,
"keySpec": "SYMMETRIC_DEFAULT",
"keyUsage": "ENCRYPT_DECRYPT",
"keyState": "Enabled",
"rotationEnabled": true,
"source": {
"scanner": "aws",
"service": "kms",
"region": "us-east-1",
"keyId": "mrk-1234abcd5678efgh"
}
}

hidden AWS Scanner configuration


← Back to Scanners Overview | Sensor Setup Guide