Deploying a scanner from the AMI Catalog
AWS Appliance Deployment Guide
Guide for deploying CyberOptix appliances in Amazon Web Services.
Overview
CyberOptix appliances are pre-configured scanner instances available as Amazon Machine Images (AMI) in the AWS Marketplace. Deploying an appliance in AWS provides a quick way to add scanning capacity in cloud environments.
Prerequisites
- AWS account with EC2 launch permissions
- VPC and subnet configured
- Security group allowing outbound HTTPS (443)
- SSH key pair for instance access
Deploy Appliance
Step 1: Find CyberOptix AMI
- Navigate to EC2 → Launch Instance
- Click Application and OS Images (Amazon Machine Image)
- Select Community AMIs tab
- Search for:
optix-appliance
Step 2: Verify AMI Publisher
Confirm the AMI is published by Purple Team Software:
Owner ID: 739275446494
Security Note: Only use AMIs published by this verified owner ID to ensure authenticity.
Step 3: Launch Instance
- Click Select → Launch instance with AMI
- Configure instance settings:
| Setting | Recommended Value | Minimum Value |
|---|---|---|
| Instance Type | t3.xlarge (4 vCPU, 16 GB RAM) | t3.large (2 vCPU, 8 GB RAM) |
| Storage | 120 GB gp3 | 100 GB gp3 |
| Network | VPC with internet gateway | VPC with NAT gateway |
| Security Group | Allow outbound 443 | Allow outbound 443 |
- Select your SSH key pair
- Click Launch instance
Step 4: Access Appliance
Connect to the appliance via SSH using the appropriate default username:
Ubuntu 24.04-based appliances:
ssh -i your-key.pem ubuntu@<instance-public-ip>Red Hat 9-based appliances:
ssh -i your-key.pem ec2-user@<instance-public-ip>Instance Configuration
Recommended Instance Types
| Instance Type | vCPU | Memory | Use Case |
|---|---|---|---|
| t3.large | 2 | 8 GB | Light scanning, development |
| t3.xlarge | 4 | 16 GB | Standard production scanning |
| t3.2xlarge | 8 | 32 GB | Heavy scanning workloads |
| m5.xlarge | 4 | 16 GB | Consistent performance needs |
Storage Configuration
- Volume Type: gp3 (general purpose SSD)
- Size: 120 GB minimum
- IOPS: 3,000 (default)
- Throughput: 125 MB/s (default)
Network Configuration
VPC Requirements:
- Internet gateway or NAT gateway for outbound connectivity
- Route to CyberOptix platform (0.0.0.0/0 or specific IP ranges)
Security Group Rules:
| Type | Protocol | Port | Destination | Purpose |
|---|---|---|---|---|
| Outbound | HTTPS | 443 | 0.0.0.0/0 | CyberOptix platform |
| Outbound | Custom | Various | Target subnets | Scanning targets |
| Inbound | SSH | 22 | Your IP | Management access |
Post-Deployment
After launching the appliance:
- Connect via SSH using the default username
- Verify connectivity to CyberOptix platform
- Configure the appliance using the scanner configuration guide
- Link to scanner group with the provided link command
- Assign to zones for automated scanning
Available AMI Versions
CyberOptix maintains AMIs for multiple operating systems:
| AMI Name | OS | Default User | Use Case |
|---|---|---|---|
| optix-appliance-ubuntu | Ubuntu 24.04 | ubuntu | Standard deployments |
| optix-appliance-rhel | RHEL 9 | ec2-user | Enterprise environments |
Cost Optimization
Right-Sizing:
- Start with t3.large and scale up based on scanning load
- Monitor CPU and memory utilization in CloudWatch
- Use AWS Compute Optimizer recommendations
Scheduling:
- Stop instances when not actively scanning (non-production)
- Use EC2 Instance Scheduler for automated start/stop
- Consider Spot Instances for development/testing
Storage:
- Use gp3 volumes (20% cheaper than gp2)
- Delete old scan data and logs periodically
- Enable EBS snapshots for backup, delete old snapshots
Monitoring & Troubleshooting
CloudWatch Metrics
Monitor these key metrics:
- CPUUtilization - Should remain below 80% during scans
- NetworkIn/NetworkOut - Indicates scanning activity
- DiskReadBytes/DiskWriteBytes - Scan result storage
Common Issues
Cannot connect to CyberOptix platform:
- Verify security group allows outbound 443
- Check route table has internet gateway/NAT gateway
- Confirm DNS resolution is working
SSH connection refused:
- Verify security group allows inbound SSH from your IP
- Check instance is in "running" state
- Confirm you're using correct username (ubuntu vs ec2-user)
Insufficient memory errors:
- Upgrade to instance type with more RAM
- Reduce concurrent scanning tasks
- Increase swap space (not recommended for production)
Security Best Practices
Access Control:
- Restrict SSH access to specific IP addresses
- Use AWS Systems Manager Session Manager instead of SSH
- Rotate SSH keys regularly
IAM Roles:
- Attach IAM role with minimum required permissions
- Use AWS Secrets Manager for sensitive configuration
- Enable CloudTrail logging for audit
Network Security:
- Deploy in private subnet with NAT gateway
- Use VPC endpoints for AWS service access
- Enable VPC Flow Logs for network monitoring
Updates:
- Enable automatic security updates
- Subscribe to Purple Team Software AMI update notifications
- Test new AMI versions in non-production first
Next Steps
- Complete appliance configuration
- Link appliance to scanner group
- Assign scanner group to zones
- Configure scan schedules and blackout dates
- Monitor scan results in CyberOptix platform
Additional Resources
Updated about 2 months ago