Which action will resolve this problem?
Generate the missing security findings list manually by logging in to the affected EC2 instances and running CLI commands.
Log in to the affected EC2 instances. Download and install the Amazon Inspector agent from AWS Marketplace on each instance.
Use a network reachability package to analyze network configurations to find security vulnerabilities on the affected EC2 instances.
Verify that the Amazon Inspector agent is installed and running on the affected instances. Restart the Amazon Inspector agent.
Explanations:
Generating the missing security findings manually is not a valid solution. Amazon Inspector requires the agent to be installed on EC2 instances to gather findings.
Amazon Inspector does not require a separate agent from AWS Marketplace. The agent is already integrated into the service, and manually installing one is unnecessary and incorrect.
A network reachability package analyzes network configurations, not security vulnerabilities. This option does not directly address the issue of missing security findings from EC2 instances.
The missing findings are likely due to the Amazon Inspector agent not being installed or not running. Verifying the installation and ensuring the agent is active will resolve the issue.