Skip to content

Commit b08fb64

Browse files
chore: add trigger instructions to docs
1 parent 6491062 commit b08fb64

File tree

2 files changed

+5
-0
lines changed

2 files changed

+5
-0
lines changed

README.md

+5
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,11 @@ provider "aws" {
6161
}
6262
```
6363

64+
### Triggers Remediation Process
65+
![Vulnerability Remediation Trigger](assets/document-screenshot.png)
66+
On successful deployment, navigate to the AWS Systems Manager console and search for the SSM document created by the module (vulne-soldier-compliance-remediate-inspector-findings) or similar. You can trigger the remediation process by running the document on the affected EC2 instances. You can also create an AWS CloudWatch event rule to automate the process based on AWS Inspector findings.
67+
68+
6469
## Inputs
6570

6671
| Name | Description | Type | Default | Required |

assets/document-screenshot.png

553 KB
Loading

0 commit comments

Comments
 (0)