AWS Inspector integration
Focus Inspector scans on exploitable CVEs in EC2, Lambda, and container images.
Integration details
Primary category
Cloud Security
Sync direction
AWS Inspector ↔ Konvu
Findings are ingested from AWS Inspector into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to AWS Inspector.
Status
Coming soon
What is AWS Inspector?
AWS Inspector provides automated vulnerability scanning for EC2 instances, Lambda functions, and container images in ECR with continuous monitoring and SBOM-based CVE detection.
Why connect AWS Inspector to Konvu
- Cut through Inspector's exhaustive CVE lists by identifying which vulnerabilities are exploitable in your specific code and configuration.
- Prioritize Lambda and container remediation based on exploitability in your environment, not just package presence.
- Track remediation decisions across Inspector's continuous scanning with persistent evidence and justifications.
How it works
Scan
AWS Inspector produces findings from scans or assessments.
Ingest & enrich
Konvu ingests those findings and enriches them with code, configuration, and deployment context.
Assess exploitability
Konvu determines exploitability and recommended action with evidence attached.
Sync decisions
Based on your workflow, Konvu can push context, status updates, and severity adjustments back into AWS Inspector.
Quick setup
When AWS Inspector is available, you’ll configure it from the integrations list in Konvu.
- 1Go to /configuration/integrations in Konvu and choose AWS Inspector.
- 2Authorize access and confirm the data sources you want to sync.
- 3Save the configuration to start syncing.
Sync direction
AWS Inspector ↔ Konvu
Findings are ingested from AWS Inspector into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to AWS Inspector.
Join the waitlist
We’ll let you know when the AWS Inspector integration is ready. Leave your email to get updates.
More integrations
View all
Wiz
Prioritize Wiz's cloud risks using exploit data and attack path context.
AWS Security Hub
Prioritize Security Hub aggregated findings using centralized exploitability analysis.

Check Point CloudGuard
Filter CloudGuard posture findings to focus on exploitable security gaps.
Datadog Cloud Security
Prioritize Datadog CSM findings with environment-specific exploitability analysis.
Google Cloud Security Command Center
Triage SCC findings with exploit data across GCP assets and vulnerabilities.

Lacework
Focus Lacework anomaly alerts on hosts with exploitable vulnerabilities.