24.1.30 Release Notes
InsightCloudSec Software Release Notice - 24.1.30 Release
Release Highlights (24.1.30)
InsightCloudSec is pleased to announce Release 24.1.30. This release includes visibility and support for AWS Glue Job and AWS Glue Crawler. In addition, 24.1.30 includes vulnerability fixes, one new Insight, one updated Query Filter, five new Query Filters, one new Bot action, and eight bug fixes.
- Contact us through the unified Customer Support Portal with any questions.
Self-Hosted Deployment Updates (24.1.30)
Release availability for self-hosted customers is Thursday, February 1, 2024. If you’re interested in learning more about becoming a hosted customer, reach out through our Customer Support Portal. Our latest Terraform template (static files and modules) can be found here. Modules can be updated with the terraform get -update
command. The Amazon Web Services (AWS) Elastic Container Repository (ECR) build images for this version of InsightCloudSec can be obtained using the following tags (all versions can be found here):
latest
24.1.30
24.1.30.c52eb95ac
ECR Build ID: c52eb95ace181962cf5be09fa849780eb6c105d9
New Permissions Required (24.1.30)
Note: Additional permission references can be found at the end of the release notes under “Required Policies & Permissions”.
New Permissions: AWS
New Permissions: AWS
For AWS Commercial and GovCloud Standard (Read-Only) Users:
- "glue:GetCrawler"
- "glue:GetCrawlers"
- "glue:GetJob"
- "glue:GetJobs"
- "glue:GetSecurityConfiguration"
- "glue:ListJobs"
These permissions support the newly added resources AWS Glue Job and AWS Glue Crawler. [ENG-33161, ENG-33159].
UI Enhancement (24.1.30)
- Added two new modals for Resource Group and Cloud account role scoping. [ENG-34495]
Resources (24.1.30)
AWS
Added visibility and support for AWS Glue Job (new Resource Type ETL Job in category Storage). Two new permissions, "glue:GetJob" and "glue:GetJobs" are required for AWS Commercial and AWS GovCloud Read-only users. [ENG-33161]
Added visibility and support for AWS Glue Crawler (new Resource Type ETL Crawler under Storage category). The following four new permissions are required for both the AWS Commercial and AWS GovCloud Read-only policies: "glue:GetCrawler", "glue:GetCrawlers", "glue:GetSecurityConfiguration", and "glue:ListJobs". [ENG-33159]
Insights (24.1.30)
GCP
Cloud Credential For Disabled API
- New Insight identifies cloud credentials scoped to specific APIs which are disabled for the project. [ENG-32564]
Query Filters (24.1.30)
AWS
Database Instance Parameter Group Filter
- New Query Filter matches database instances that are associated with a parameter group that does/doesn't have a specified value of the parameter. [ENG-32117]Database Instance Option Group Filter
- New Query Filter matches database instances that are associated with an option group that does/doesn't have a specified option name or value of the option setting. [ENG-32117]Database Cluster Parameter Group Filter
- New Query Filter matches database clusters that are associated with a parameter group that does/doesn't have a specified value of the parameter. [ENG-32117]Resource Web Application Firewall Contains Managed Rule Names
- Updated description to clarify the filter matches resources based on the associated web application firewall having one or more supplied managed rule names. Please note this is not applicable to CloudFront resources." [ENG-33307]
GCP
Cloud Account Without Sink Configured For All Log Entries
- New Query Filter identifies GCP projects which do not have Sink configured for all log entries. [ENG-32571]Cloud Credentials For Disabled API
- New Query Filter identifies cloud credentials scoped only to disabled APIs. [ENG-32564]
Bot Actions (24.1.30)
GCP
- "Disable Service Role" - New Bot action to disable a GCP Service Role. A new permission "iam.serviceAccounts.disable" is required; this permission is accounted for in our list of Recommended APIs. [ENG-33574]
Bug Fixes (24.1.30)
Fixed an issue where the following Insights were returning false positives:
Database Instance Flag 'log_error_verbosity' Not Default
,Database Instance Flag 'log_min_error_statement' Not Set Appropriately
, andDatabase Instance Flag 'log_min_messages' Not Set Appropriately
. [ENG-34030]Fixed a bug where deleted and re-created resources were treated as deleted and skipped by the parser. [ENG-33796]
Fixed an issue inserting AWS Shield events with live attack data in Threat Findings. [ENG-33525]
Fixed a bug where the “Cleanup Resource Policy” action incorrectly cleaned up resource policies on resources marked as public by related Insights (e.g., the Insight
Serverless Function Exposed to the Public
) and Query Filters. [ENG-32837]Fixed the filter for MySQL database that checks if the database uses Active Directory Authentication. [ENG-31488]
Fixed the sorted order of the "Clouds by Bot" card on the Summary view. [ENG-31170]
Fixed navigation to Related Resources. [ENG-30607]
Resolved CWE-1321 vulnerability, which relate to Prototype Pollution affecting axios package. [ENG-34200]
Required Policies & Permissions
Policies required for individual CSPs are as follows:
Alibaba Cloud
AWS
- Commercial
- Read Only Policy
- Power User Policy
- GovCloud
- Read Only Policy
- Power User Policy
- China
Azure
- Commercial
- GovCloud
GCP
- For GCP, since permissions are tied to APIs, there is no policy file to maintain. Refer to our list of Recommended APIs, which is maintained as part of our GCP coverage.
Oracle Cloud Infrastructure
Host Vulnerability Management
For any questions or concerns, reach out to us through your CSM or the Customer Support Portal.