Changed
The policy query fix for lacework-global-306. Non-running compute instances were improperly being marked as non-compliant for having public access.
The policy query fix for lacework-global-306. Non-running compute instances were improperly being marked as non-compliant for having public access.
Resolved an issue where AWS root accounts were incorrectly flagged as non-compliant due to changes in the AWS IAM get-credential-report API. Query logic has been updated in the following policies:
The following policy's title and description have been updated to clarify that a violation occurs when an AWS Elastic Load Balancer is associated with a security group that allows unrestricted egress or ingress:
A query improvement has been made for the following policy, fixing an issue where AWS accounts with CloudTrail trails configured to use advanced event selectors were being flagged as non-compliant:
The severity of the following policies has decreased from high
to medium
, to align with internal standards:
The AWS Foundational Security Best Practices (FSBP) Standard compliance benchmark has been updated with new policies that are of high severity.
The following policies are newly added and are automated:
The following policies are newly added but are manual:
The following policies already exist and have been updated as part of this release
A query improvement has been made for the following policies, which simplifies the logic and also updates the severity:
The severity for lacework-global-52 has been increased from medium to high, and for lacework-global-171 it has been decreased from critical to medium, to reflect recent reviews of some Lacework policies.
The CIS Google Kubernetes Engine (GKE) 1.4.0 Benchmark compliance benchmark has been updated with newly automated policies.
The following policies that were manual have now been automated:
Some changes have been made to the following policies to fix an issue whereby the region was being incorrectly reported, causing unexpected non-compliant assessment results.
The queries that support these policies now correctly report the primary region, rather than the paired region.
The CIS Google Cloud 2.0.0 Benchmark compliance framework is now available.
The following policies are newly added as part of this update:
The remaining policies in the benchmark are re-used from the CIS Google Cloud 1.3.0 Benchmark.