NSAuditor AI EE 0.6.1 Adds NEW Plugin 1200 AWS Inspector2 / GuardDuty Enablement Auditor — Foundation-Layer SOC 2 Evidence for CC7.1 + CC7.2 (Plugin Count 21 → 22)

EE 0.6.1 — NEW plugin 1200 AWS Inspector2 / GuardDuty Enablement Auditor (plugin count 21 → 22). Foundation-layer SOC 2 evidence for CC7.1 detection procedures + CC7.2 monitoring of system components. Standalone Pro trial program retired.

nsauditor-ai-ee-0-6-1-inspector2-guardduty-auditor

What’s new: Nsasoft US LLC has shipped NSAuditor AI Enterprise Edition 0.6.1 — adding NEW plugin 1200 AWS Inspector2 / GuardDuty Enablement Auditor. Plugin count grows 21 → 22. The release is a paired trio across EE + CE 0.1.55 + agent-skill 0.1.22. The catalog across CE and EE is now 49 plugins (27 CE + 22 EE).

Why this matters for SOC 2 readiness

AWS GuardDuty and AWS Inspector2 are the AWS-native managed services for threat detection and vulnerability detection respectively. A SOC 2 evidence pack without GuardDuty signal has no AWS-native anomaly-detection stream — credential-exfiltration attempts, cryptocurrency-mining indicators, malicious-IP communication, and reconnaissance patterns all go unobserved. A pack without Inspector2 signal has no managed CVE-detection coverage on the compute surface (EC2 AMIs, ECR images, Lambda functions), making patching-cadence assertions difficult to evidence.

What plugin 1200 audits

Dimension Control Highest severity Closure
1. GuardDuty Detector enablement CC7.1 HIGH Audited region with no GuardDuty Detector configured — managed threat-detection absent
2. GuardDuty protection-feature coverage CC7.1 MEDIUM Missing baseline features (S3 data events, EKS audit logs, EBS malware protection, RDS login events, Lambda network logs, runtime monitoring)
3. Inspector2 enablement CC7.2 HIGH Account where Inspector2 is not enabled, suspended, or disabled — CVE coverage absent
4. Inspector2 scan-target coverage CC7.2 HIGH / MEDIUM Zero coverage = HIGH; partial coverage = MEDIUM with explicit disabled-resource-types list

Unambiguous remediation

For each dimension, plugin 1200 distinguishes auditor-side IAM gaps (the auditor role lacks the GuardDuty or Inspector2 read permission) from genuine service-side absence — so remediation paths are unambiguous. Either grant the read permission, or enable the service.

Compliance mapping

Seven new entries in data/compliance/soc2.json route plugin 1200 findings to CC7.1 (four entries) and CC7.2 (three entries). Title-pattern regexes are anchored to the actual emission strings emitted by the plugin so the compliance mapping is end-to-end deterministic.

Design discipline

  • Conservative classification — Ambiguous AWS-SDK responses emit LOW + evidenceGap with a walkthrough prompt, never silent-PASS.
  • Case-insensitive enum handling — Status fields normalized at the SDK boundary so case variation across SDK versions cannot mask a finding.
  • Zero data exfiltration — Findings carry only AWS-public-namespace identifiers (Detector IDs, region, status enums). Operator-supplied tags, descriptions, and other free-text surfaces are never read.
  • Soft-degrade — GuardDuty and Inspector2 SDKs load independently; failure of one does not block the other.

Coverage matrix unchanged at 10/4/33

Plugin 1200 deepens evidence-acquisition on controls already classified as covered (via the CloudTrail, AWS Backup, and SQS/SNS plugins). NSAuditor publishes coverage-matrix shifts only when net-new controls become covered, not when evidence depth grows on existing ones — an institutional honesty discipline auditors can rely on across releases.

Also in this release: standalone Pro trial program retired

The 14-day Pro trial program (/ai/trial/) has been retired. The Community Edition (free, MIT) already provides enough hands-on functionality for evaluation: install CE, run scans, see the platform in action, then upgrade to Pro when CVE matching / verification probes / risk scoring become a fit. The /ai/trial/ URL now redirects to /ai/pricing/.

How to run plugin 1200

# Just plugin 1200
nsauditor-ai scan --host aws --plugins 1200 --compliance soc2 --out evidence.json

# Bundled with the rest of the EE AWS catalog
nsauditor-ai scan --host aws --plugins all --compliance soc2 --out evidence.json

Who’s affected

AWS architects building SOC 2 evidence packs that must include detection-procedure coverage; SOC 2 readiness teams covering CC7.1 + CC7.2; SRE / DevSecOps teams running multi-account AWS organizations; auditors validating that GuardDuty and Inspector2 are actually enabled (not just licensed); AI-coding-agent users.

Customer install (live now)

npm install -g nsauditor-ai@0.1.55 @nsasoft/nsauditor-ai-ee@0.6.1
npm install nsauditor-ai-agent-skill@0.1.22   # AI-coding-agent users

Sources