Skip to Content
Release NotesInsightcloudsec23.7.18 Release Notes

Jul 18, 2023

InsightCloudSec is pleased to announce Release 23.7.18

InsightCloudSec Software Release Notice - 23.7.18 Release

🚧 Major Documentation Announcement: Site Migration

On August 1st, 2023, the InsightCloudSec documentation will be available on docs.rapid7.com alongside the documentation for the rest of the Rapid7 software portfolio.

While a lot of work will happen behind the scenes, you should largely be unaffected. Here are some important things you should know about this move:

  • We pride ourselves on our documentation process and quality. These will not be changing.
  • The new site will be located at docs.rapid7.com/insightcloudsec/; the old site (docs.divvycloud.com) will still exist until December 31st, 2023.
  • The new and old sites are functionally similar, but the release notes will be in a different location (separate from the documentation): docs.rapid7.com/release-notes/insightcloudsec/
  • After August 1st, 2023, the InsightCloudSec documentation team will only maintain the new site; the old site will remain static until its retirement
  • After December 31st, 2023, all docs.divvycloud.com-related URLs will redirect to docs.rapid7.com/insightcloudsec/-related URLs

Visit our Getting Support page for details on contacting support for any questions or issues with the transition.

Release Highlights (23.7.18)

InsightCloudSec is pleased to announce Release 23.7.18. This release includes resolution for two CVEs: CVE-2021-21306 and CVE-2021-32014. In addition, 23.7.18 includes one updated Query Filter and four bug fixes.

👍 Release Tagging

The InsightCloudSec team is expanding our tagging strategy for publishing images. To align ourselves with industry best practices, each new InsightCloudSec build version will include a hash after the version number (including hot fix versions). This means you can obtain this version of InsightCloudSec using three, separate tags (all versions can be found here):

  1. latest
  2. 23.7.18
  3. 23.7.18.d44008333

📘 Self-Hosted Deployment Updates (23.7.18)

Release availability for self-hosted customers is Thursday, July 20, 2023. If you’re interested in learning more about becoming a hosted customer, reach out through our Customer Support Portal.

Our latest Terraform template (static files and modules) can be found here: <https://s3.amazonaws.com/get.divvycloud.com/prodserv/divvycloud-prodserv-tf/example-usage/aws/release/divvycloud-tf-release.zip>

Modules can be updated with the terraform get -update command.

Features & Enhancements (23.7.18)

  • Resolved CVE-2021-21306 and CWE-400 vulnerabilities, which relate to Regular Expression Denial of Service (ReDoS). [ENG-28480]

  • Resolved CVE-2021-32014 CWE-400 vulnerabilities, which relate to Denial of Service (DoS). [ENG-28476]

Query Filters (23.7.18)

AWS

  • Encryption Key Is Disabled - Added an option to ignore encryption keys that are scheduled for deletion. Customer-managed keys in AWS KMS, for example, are disabled when they are scheduled for deletion. [ENG-29372]

Bug Fixes (23.7.18)

  • Fixed an issue with incorrect severity default in Attack Path Listing. Attack paths are now properly sorted by risk score as default. [ENG-29421]

  • Fixed a minor issue where AWS accounts with invalid credentials would be re-enabled for harvesting when the credentials were still invalid due to incorrect interpretation of an error message. The account would revert back to the invalid status after a few failed harvesting jobs which was misleading for the end user observing this. The account now keeps the invalid status. [ENG-29396]

  • Fixed an edge case for some Attack Path groupings not working properly. [ENG-29355]

  • Fixed a bug for IaC scanning using Insight Instance OS Disk Not Encrypted. [ENG-28458]

Required Policies & Permissions

📘 **Policies required for individual CSPs are as follows: **

Alibaba Cloud

AWS

Azure

GCP

Oracle Cloud Infrastructure

Host Vulnerability Management

For any questions or concerns, as usual, reach out to us through your CSM, or the Customer Support Portal.