Sep 19, 2023
InsightCloudSec is pleased to announce Release 23.9.19
InsightCloudSec Software Release Notice - 23.9.19 Release
DivvyCloud Docs Site End-of-Life (EOL) Update
On August 1st, 2023, the InsightCloudSec documentation transitioned to docs.rapid7.com to be with the documentation for the rest of the Rapid7 software portfolio. The old site (docs.divvycloud.com) will continue to exist until a near-future date but will remain static. After this date, any links to the old site will be redirected to their docs.rapid7.com/insightcloudsec/ counterpart, so the old site will functionally not be visible publicly. However, the API reference will still be available until further notice. Visit our Getting Support page for details on contacting support for any questions or issues with the transition.
Release Highlights (23.9.19)
InsightCloudSec is pleased to announce Release 23.9.19. This release includes content updates and scripting support to the GCP and Azure onboarding experiences, expanded Regex support for Query Filters, and a filtering behavior change to Identity Analysis. In addition, 23.9.19 includes two updated Insight, multiple updated Query Filters to add REGEX field options, and eight bug fixes.
- Contact us through the unified Customer Support Portal with any questions.
Self-Hosted Deployment Updates (23.9.19)
Release availability for self-hosted customers is Thursday, September 21, 2023. If you’re interested in learning more about becoming a hosted customer, reach out through our Customer Support Portal . Our latest Terraform template (static files and modules) can be found here . Modules can be updated with the terraform get -update command. The Amazon Web Services (AWS) Elastic Container Repository (ECR) build images for this version of InsightCloudSec can be obtained using the following tags (all versions can be found here ):
latest23.9.1923.9.19.c011c5581
Features & Enhancements (23.9.19)
-
Updated onboarding content:
-
Added GCP scripting support to onboarding. Review the GCP Onboarding documentation for more information. [ENG-29570]
-
Added a new script flow for Azure onboarding. Review the Azure Onboarding documentation for more information. [ENG-29571]
-
Other general Azure onboarding content updates. [ENG-29574]
-
-
Related resources denote whether or not they’ve been explored using new iconography. [ENG-29390]
-
Interacting with the Trends and Analytics charts on the Identity Analysis page will now additively filter instead of resetting the filters list. [ENG-29450]
Insights (23.9.19)
AWS
- Updated two Insights to have a severity of 5 for consistency with other similar Insights reporting the same public access but via another means (e.g., ACL). [ENG-31318]
Storage Container Public Access Via Resource Access PolicyResource Violation Identified by IAM Access Analyzer – Public
Query Filters (23.9.19)
Validation for REGEX Fields
This change adds the REGEX field option to the remaining filters in ICS that use REGEX, but were not included on the first pass of filters to which the new option was added. Any Bots that are using these filters but have been supplied with an invalid REGEX pattern will be marked as invalid upon release. These can be reconfigured as normal through BotFactory. The following filters have been affected by this change:
App Run Service Repository Regular Expression (Regex)Database Cluster Activity Stream Name Regular Expression (Regex)Identity Provider Regular ExpressionInstance Running Unapproved Image (Regex/Age)Resource Associated With Access List (Regex)Instance Using Specific Role (Regex)Instance User Data Search (Regex)– DEPRECATEDInstance Associated With Subnet By Name (Regex)Instance Has Been Accessed Via SSMMessage Queue Redrive Policy Configuration (Regex)Machine Learning Instance EnvironmentMachine Learning Instance Environment VersionNetwork Interface Description Regular ExpressionAccess List Name Regular Expression (Regex)Access List Name Regular Expression Exclusion (Regex)Instance Operating System Distribution (Regex)Serverless Function Contains Specific Environment Variables (Regex)Resource Encryption Key Name Regular Expression (Regex)Snapshot Description Regular ExpressionStack Template Contains Regex (AWS)Stack Template Excludes Regex (AWS)Storage Container Configured With Lifecycle RulesStorage Container Not Configured With Lifecycle RulesParent Resource Contains Tag Key and Value Regular Expression (Regex)Resource Contains Tag Key and Value Regular Expression (Regex)Resource Contains Tag Key Regular Expression (Regex)Template Spec Includes/Excludes Regular Expressions (Regex)Web Application Firewall Contains Rule Group ReferenceResource Web Application Firewall Contains Rule Group ReferenceWeb Application Firewall Rule Name Regular Expression SearchResource Web Application Firewall Rule Name Regular Expression Search (AWS)Web Application Firewall Rules Contain Expression (GCP)
Validation has been added to all options within the following Query Filters. Any Bots that are using these Query Filters, but have been supplied with invalid input, will be marked as invalid upon release. These can be reconfigured as normal through BotFactory. The following filters have been affected by this change:
Resource Exposing Specific PortsResource Exposing All PortsResource InsightVM Risk ScoreResource Vulnerability Wildcard SearchResource Vulnerability Count By SeverityResource Age ExceedsResource Age Exceeds ThresholdResource Age At MostResource Monthly CostResource In RegionResource Not In RegionResource Recently ModifiedResource Recently Created Or DiscoveredResource Is Marked NoncompliantResource In Cloud With/Without Badge Key/ValueResource In Cloud With/Without Badge KeyResource Scheduled For DeletionResource Not In Resource GroupResource In Resource GroupResource In Resource Group (Regex)Resource Not Associated With Active Insight ExemptionsResource In/Not In Cloud AccountResource Not In Cloud With Badge Key/ValueResource Allows Ingress Access From Unapproved NetworksResource With Permissive Network Access RulesResource With Drift ProtectionResource With/Without Azure Lock (Azure)Resource By Cloud Provider NameResource Provisioned From Unauthorized Network (AWS)Resource With Suspicious EventResource Provisioned Using TerraformResource Not Provisioned Using TerraformResource Provisioned Using Cloud FormationResource Not Provisioned Using Cloud FormationResource Associated With Application By CategoryResource Associated With Business Critical ApplicationResource Not Associated With Business Critical ApplicationResource Violation Identified By IAM Access AnalyzerCloud User/Role Console Logon From Unauthorized NetworkResource Contains Tag Key/Value PairResource Contains Tag Key and Value Regular Expression (Regex)Resource Contains Multiple Tag Keys And Value Regular Expressions (Regex)Resource Contains Tag Key Regular Expression (Regex)Resource Contains Tag Key With Empty ValueResource Contains Tag Key and Value Email ValidationResource Does Not Contain Tag Key/Value PairResource Contains Tag KeyResource Missing Tag Keys (Any Missing)Resource Missing Tag Keys (All Missing)Resource Associated With Map Reduce ClusterResource Tag Date ComparisonResource Tag Date/Time Comparison
[ENG-30498]
Bug Fixes (23.9.19)
-
Fixed an edge case where the notification topic harvester for AWS was not finding resources triggered by EDH. [ENG-31387]
-
Fixed a bug involving ability to disable the following AWS regions: ap-south-2, eu-south-2, eu-central-2, and ap-southeast-4. [ENG-31093]
-
Fixed an issue with Related Resources for Azure Subnet and Azure Route Table. [ENG-30886]
-
Fixed an issue with false positives with the
Instance With/Without Default Route To InternetQuery Filter limited to Azure resources. [ENG-30886] -
Fixed an issue that caused OCI DatabaseInstanceHarvester to sometimes crash when trying to find IPNetworks for Autonomous Databases. [ENG-30815]
-
Fixed an issue with Resource Created (Delayed) hookpoint. [ENG-30694]
-
Fixed an issue with Query Filter
App Service Not Enforcing Client Certificate Validationgiving false positives. Query Filter now excludes resources with HTTP Version 2.0 from the results as resources with this field automatically have ‘Client Certificate Model’ set to ignore. [ENG-30577] -
Fixed KeyError in AWSContainerClusterHarvester. [ENG-29690]
Required Policies & Permissions
Policies required for individual CSPs are as follows:
Alibaba Cloud
AWS
- Commercial \t- Read Only Policy \t\t - Part 1 \t\t- Part 2 \t\t- Part 3 \t- Power User Policy
- GovCloud \t- Read Only Policy \t\t- Part 1 \t\t- Part 2 \t\t- Part 3 \t- Power User Policy
- China \t- Read Only Policy \t\t- Part 1 \t\t- Part 2 \t\t- Part 3
Azure
- Commercial \t- Custom Reader User Role \t- Power User Role \t- Reader Plus User Role
- GovCloud \t- Custom Reader User Role \t- Power User Role
GCP
- For GCP, since permissions are tied to APIs there is no policy file to maintain. Refer to our list of Recommended APIs that is maintained as part of our GCP coverage.
Oracle Cloud Infrastructure
Host Vulnerability Management
For any questions or concerns, as usual, reach out to us through your CSM, or the Customer Support Portal .