Release Summary
InsightCloudSec is pleased to announce release version 24.10.15. This release includes a Kubernetes cluster reclassification, new AWS resources, and many new Query Filters and Insights.
New Permissions: Amazon Web Services
These permissions support the AWS Elasticsearch Ingest Pipeline resource. All permissions have been added to the appropriate onboarding user roles.
For AWS Read-Only Users:
"chime:ListVoiceConnectors"
,"chime:GetVoiceConnectorOrigination"
,"chime:GetVoiceConnectorTermination"
,"osis:GetPipeline"
,"osis:ListPipelines"
For AWS Power Users:
"chime:*"
"osis:*"
Python upgrade
With this release, InsightCloudSec is upgrading our Python to version 3.10. Custom Plugins may be affected, so you should contact your Customer Success Manager or Support for help upgrading your plugins.
Details for self-hosted customers
InsightCloudSec version 24.10.15 will not be made available to self-hosted customers. Use version 24.10.8 or wait until the next release (24.10.22).
New
- Local and Cloud-managed (remote) Kubernetes clusters, like Azure Kubernetes Service (AKS) or Elastic Kubernetes Service (EKS), are now tracked in relation to their parent cloud account. This means they'll appear in the full count when exploring a Cloud Account's resources. You'll still be able to manage all your clusters on the Kubernetes Clusters page. As a result of this change, many of the features throughout InsightCloudSec have been upgraded to assist you in monitoring your Kubernetes Clusters, including the Resource Inventory, Layered Context, and Vulnerabilities. You may also see changes in Insight findings and Query Filter results, which means Bots that are scoped to generic filters (for example: to AWS or a Cloud Account but not to a specific resource) may run.
- Added support for the AWS Elasticsearch Ingest Pipeline and Amazon Chime resources, including various new and modified Query Filters and Insights.
- Added the following Insights to map to CIS Azure 2.1 recommendations:
Cloud Account without Additional email addresses configured for Security Contact Email
(recommendation 2.1.18)Storage Account with Cross Tenant Replication Enabled
(recommendation 3.16)Cloud Account without Diagnostic Settings for Activity Logs
(recommendation 5.1.1)Cloud Account with Conditional Access Policy that Blocks Geographic Locations Out Of Scope
(recommendation 1.2.2)
- Added the following Insights:
Allow Listed Compute Instance Open to the Public
ElasticSearch Ingest Pipeline using Cloud Managed Key Instead of Customer Managed Key
ElasticSearch Ingest Pipeline Has Publicly Exposed Data
ElasticSearch Ingest Pipeline With Destination Bucket Without VPC Restricted Access
ElasticSearch Ingest Pipeline Not Within VPC
ElasticSearch Ingest Pipeline Without Logging Configured
- Added the following Query Filters:
Content Delivery Network With Specified Origin Type
Content Delivery Network With Custom Origins (Regex)
Cloud Account Without Diagnostic Settings
Cloud Account with Conditional Access Policy without included locations enabled
Allow Listed Instance Open to the Public
ElasticSearch Ingest Pipeline Within VPC
ElasticSearch Ingest Pipeline Status
ElasticSearch Ingest Pipeline Destination Bucket Not Restricted To VPC
ElasticSearch Ingest Pipeline Destination Bucket is Publicly Exposed
ElasticSearch Ingest Pipeline Without Logging Configured
- Added source documents support for Amazon Connect, AWS Redshift Serverless Namespaces, and AWS Redshift Serverless Workgroups.
- Added support for VPC Endpoint/PrivateLink resources in CloudFormation Infrastructure-as-Code (IaC) scans.
Improved
- Added a retention policy of 365 days for completed Scheduled Events.
- Renamed the
Storage Account Allows Public Blob Access
Insight toStorage Account with Allow Blob Anonymous Access Enabled
to better map to CIS Azure 2.1 recommendation 3.17. - Reconfigured all Insight tags (labels) to conform to a standard format and to be more descriptive.
- Marked the
Content Delivery Network With Object Storage Origin
Query Filter for future removal. - Marked the
Content Delivery Network With Specific Origin Type
Query Filter for future removal. - Marked the
Instance With Serial Port Connectivity Enabled (Deprecating)
(ID 480) for future removal. You should use the identical Insight,Instance With Serial Port Connectivity Enabled
(ID 227), instead. - Added a new internal table to help audit Bot resource deletions.
- Updated the look-and-feel of the Vulnerability Assessment In-Scope coverage graph for improved readability and usability.
Fixed
- Improved exception handling for the Service Limit Harvester to reduce failures.
- Fixed an issue where deleting a badge wouldn't immediately update the badge counts for cloud accounts that had the badge.
- Fixed IaC scans not correctly identifying Container Registries with public network access.
- The Case Insensitive toggle for Applications Settings has been temporarily disabled as it was not applying correctly.