Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

29.2.24

2.28.0: GitHub Registry, reduce URLs for Image Assurance

Type: New Feature + improvements

Description:

Image Assurance 2.29.0:

  • Release Github Container Registry Scanning support

  • Reduced the number of URLs that need to be accessed by the agents (relevant for Scan Engine Version 2.0.0 only). CloudGuard agents must have connectivity to these region-specific URLs:

Security enhancements - all agents:

  • Image Assurance 2.29.0

  • Admission Control: Enforcer 2.11.0 & Policy 1.8.0

  • Inventory 1.14.0

  • Flow-logs 0.14.0

  • Runtime Policy 1.8.0

Affected Components: CloudGuard Workload Protection agents

15.1.23

Workload Protection for Kubernetes:

Description:

UI changes-

  • Workload Protection Menu

◦ Rename “Image Assurance” -> “Vulnerabilities”, “Vulnerabilities” -> “Findings”

  • GSL Builder

◦ Rename  “Image Assurance”  to "Workload Vulnerability"
◦ Add Package, Malware and Insecure content
◦ Mark "Finding" and "ImageScan" as Deprecated

  • Notification

◦ Rename "Image Assurance - Image Scan only" to "Vulnerability Scanning"

19.11.23

Workload Protection for Kubernetes: helm 2.24.3

Description:

Image Assurance 2.25.0

  • support Sonatype Nexus Registry scan

All features: Inventory 1.13.0; Image Assurance 2.25.0; Admission Control: enforcer 2.9.0, policy 1.7.0; Runtime Protection: policy 1.7.0; Flow Logs 0.12.0

  • improved telemetry

  • security enhancements

Affected Components: CloudGuard Workload Protection agents

24.10.23

Workload Protection for Kubernetes: helm 2.23.0

Description:

  • Admission Control: enforcer 2.8.0, policy 1.6.0

    • Enforcer server receives requests on port 8443 instead of port 8080

  • Image Assurance 2.23.0

    • When scanning an ECR Container Registry from an EKS cluster, a custom IAM Role can be used for access control (within the same AWS account or across accounts)

  • Runtime Protection: policy 1.5.0

    • Adjust support for Pod Security Policy

  • Flow Logs 0.10.0

    • Improved telemetry

  • Inventory 1.11.1

    • GKE Autopilot support

  • All features

    • Support for GKE Autopilot (except for Runtime Protection)

    • Do not attempt to run Daemonset pods on Fargate nodes that are not supported

Affected Components: CloudGuard Workload Protection agents

12.9.23

Fix agent status for GKE autopilot in compliance

Agent Status Support for GKE Autopilot Clusters

30.7.23

Helm 2.22.0 release-

Workload Protection for Kubernetes: helm 2.22.0

Runtime Protection daemon 1.8.8

  • added some security enhancements

25.6.23

Helm 2.21.0 release-

  • Support for GKE Autopilot (except for Runtime Protection)

  • Configure agents with node-critical and cluster-critical priority classes by default (improved support for clusters with small nodes)

  • Helm installation speedup

  • Support multiple DaemonSet configurations per node pool

  • Runtime Protection: keep running if EBPF probe can't be built/loaded; multiple optimizations

  • Inventory: Improved support for large inventory of Kubernetes resources

  • Change imageScan.mountPodman default to false (reduce dependencies on node configuration)

1.6.23

Return time zone-

Due to a wrong timezone that was presented at the UI,
we should send the timezone (in iso date format) from the APIs

...

The following features have been added to the Helm EA branch:Support GKE Autopilot clusters (version 1.25 and above) via helm flag: --set platform=gke.autopilot

Allow specifying priority class per agent. Set 'cluster-critical' and 'node-critical' priority class for agents by default

...