2018 Releases
Deployment - December 16, 2018 |
BUG FIXESDFT-394 - GSL fix - Use secure ciphers in CloudFront distribution Rule ID: D9.AWS.CRY.16 DFT-396 - D9.GCP.NET.AG5.VMInstance.22.TCP- Correct description and Remediation DFT-408 - Dynamo DB -Remove the rule D9.AWS.CRY.18 due to Default encryption settings DFT-412 - Remove the rules D9.AZU.CRY.07 and D9.AZU.CRY.08 Click here for more details |
Deployment - December 10, 2018 |
Compliance and governance:
BUG FIXES
|
Deployment - December 5, 2018 |
Protected Assets:
Email notifications:
|
Deployment - November 25, 2018 |
Compliance and governance:
Compliance Updates: New Bundles:
New Rules:
November 25, 2018 Rules Changes - click here BUG FIXES
|
Deployment - November 23, 2018 |
Compliance and governance: PREVIEW
|
Deployment - November 18, 2018 |
Compliance and governance: PREVIEW
BUG FIXES Compliance:
|
Deployment - November 14, 2018 |
Cross system:
Compliance and governance:
BUG FIXES Compliance rule builder:
|
Deployment - November 13, 2018 |
Compliance and governance:
|
Deployment - November 8, 2018 |
Administration
|
Deployment - November 5, 2018 |
Compliance and governance:
BUG FIXESSystem Dashboard:
Compliance report:
|
Deployment - November 1, 2018 |
Compliance and governance: PREVIEW
|
Deployment - October 29, 2018 |
BUG FIXESProtected Assets:
|
Deployment - October 23, 2018 |
Administration:
|
Deployment - October 11, 2018 |
Compliance and governance:
Administration:
|
Deployment - October 10, 2018 |
Cloud Accounts
|
Deployment - October 8, 2018 |
Administration
|
Deployment - October 4, 2018 |
PREVIEW to GA
|
Deployment - September 27, 2018 |
Compliance Updates: New Bundles:
New Rules:
September 27, 2018 Rules Changes - click here BUG FIXESCompliance engine:
Compliance rules:
|
Deployment - September 17, 2018 |
BUG FIXES
|
Deployment - September 16, 2018 |
BUG FIXES
|
Deployment - September 06, 2018 |
BUG FIXES
|
Deployment - September 04, 2018 |
Compliance Updates:New Rules:
Deleted Rules:
Changes To Existing Rules - Click Here BUG FIXES
For more information please click here |
Deployment - August 22, 2018 |
Compliance and governance:
|
Deployment - August 22, 2018 |
BUG FIXES
|
Deployment - August 20, 2018 |
BUG FIXES
|
Deployment - August 16, 2018 |
Example:
|
Deployment - August 15, 2018 |
PREVIEW
Example:
|
August 06 Compliance Updates:
New Bundles:
- AWS ISO 27001:2013 Automated Validation of ISO 27001:2013 Requirements for AWS
- Azure ISO 27001:2013 Automated Validation of ISO 27001:2013 Requirements for Azure
- GCP ISO 27001:2013 Automated Validation of ISO 27001:2013 Requirements for GCP
New Rules:
- D9.AWS.LOG.13 - ELB is created with Access logs enabled
- D9.AWS.NET.30 - ECS Cluster should have active services
- D9.AWS.NET.31 - ECS Cluster should not have services without running tasks
- D9.AWS.NET.32 - ECS Cluster instances must be placed in a VPC
- D9.AWS.NET.33 - ECS Cluster should not have running container instances with unconnected agents
- D9.AWS.CRY.19 - ElastiCache At-Rest Encryption
- D9.AWS.NET.34 - Ensure that at least one instance is registered with an ECS Cluster
Rules Changes:
Bug Fixes:
- DFT-221 - S3 bucket should have versioning MFA delete enabled. GSL updated to: S3Bucket should have versioning.mfaDelete=true
- DFT-254 - Use secure ciphers in CloudFront distribution. GSL updated to: CloudFront should have distributionConfig.viewerCertificate.minimumProtocolVersion like 'TLSv1.1%'
- DOME-7844 - Ensure a log metric filter and alarm exist for Management Console sign-in without MFA GSL Updated to: List<CloudTrail> should have items with [ hasSNSSubscriber='true' and metricFilters with [filterPattern isFilterPatternEqual('{ ($.eventName = ConsoleLogin) && ($.additionalEventData.MFAUsed != Yes) }') or filterPattern isFilterPatternEqual('{ $.userIdentity.sessionContext.attributes.mfaAuthenticated != true }')] ] length() > 0]
Additional Rule Changes including Wording Changes - Updated Rule Names, Description and Remediation Fields, Compliance Sections Updates.
For more information please click here
PREVIEW
Compliance engine:
Azure KeyVault entity support.
Examples:
Ensure KeyVault is not empty
KeyVault should have keys
Compliance engine:
New Rules:
- D9.AWS.AS.02 - S3 Buckets outside of Europe
- D9.AZU.AS.01 - Instances outside of Europe
- D9.AWS.CRY.18 - DynamoDB - Server Side Encryption
- D9.AWS.OPE.01 - Lambda Functions must have an associated tag
- D9.AZU.NET.29 - Public AMI
- D9.AWS.NET.AG4.ApplicationLoadBalancer.9090.TCP - ApplicationLoadBalancer with administrative service: CiscoSecure,websm (TCP:9090) is too exposed to the public internet
- D9.AWS.NET.AG4.ELB.9090.TCP - ELB with administrative service: CiscoSecure,websm (TCP:9090) is too exposed to the public internet
- D9.AWS.NET.AG4.Instance.9090.TCP - Instance with administrative service: CiscoSecure,websm (TCP:9090) is too exposed to the public internet
- D9.AWS.NET.AG4.NetworkLoadBalancer.9090.TCP - NetworkLoadBalancer with administrative service: CiscoSecure,websm (TCP:9090) is too exposed to the public internet
- D9.AWS.NET.AG5.ApplicationLoadBalancer.9090.TCP - ApplicationLoadBalancer with administrative service: CiscoSecure,websm (TCP:9090) is exposed to a wide network scope
- D9.AWS.NET.AG5.ELB.9090.TCP - ELB with administrative service: CiscoSecure,websm (TCP:9090) is exposed to a wide network scope
- D9.AWS.NET.AG5.Instance.9090.TCP - Instance with administrative service: CiscoSecure,websm (TCP:9090) is exposed to a wide network scope
- D9.AWS.NET.AG5.NetworkLoadBalancer.9090.TCP - NetworkLoadBalancer with administrative service: CiscoSecure,websm (TCP:9090) is exposed to a wide network scope
Rules Updated:
- D9.AWS.CRY.04- S3 Bucket should have encryption in transit for read actions
- D9.AWS.CRY.14 - S3 Bucket should have encryption in transit for write actions
Bundle Titles and Descriptions update:
- AWS NIST 800-53 Rev 4 (FedRAMP)
- Azure NIST 800-53 Rev 4 (FedRAMP)
- GCP NIST 800-53 Rev 4 (FedRAMP)
For more information please click here
Compliance Bundles change
We have expanded and updated our compliance bundles!
Updated some existing rules / bundles mappings including the following bug Fixes
- DFT-197 - Update compliance section references for AWS NIST 800-53 bundle.
- DFT-206 - improved ELB with weak ciphers rules.
- DFT-207 - fixed rules with "contain" usages.
Bug fixes:
Clarity:
DFT-216 - Fixed VPC Peering to cross region handling.
Compliance engine:
DFT-191 - Fixed tool tips and UI flickering.
Dynamic Access page:
Added UI improvements.
Added terminate all support
Bug fixes:
Policy reports:
DFT-141 - Fixed export to CSV formatting.
IAM Reports:
DFT-194 - Fixed Credentials report export to CSV date fields support.
Home Page:
DFT-214 - Fixed cloud account findings.
Cross system:
New Main menu
Improved the product categories
Bug fixes:
Security groups:
DOME-5165- Added SG type name to the title.
IAM Reports:
DOME-7284 - Fixed Credentials report date fields sorting.
Home Page:
DFT-157 - Fixed inaccurate cloud account information sync.
Compliance engine:
IAM User - Added new field: "mfaType" which will be of values "None" / "Hardware" / "Virtual".
CloudTrail - Expanded the metric filters structure to better troubleshoot sns subscriptions,
Bug fixes:
Compliance engine:
DFT-50 - Fixed missing region field for S3Buckets.
Bug fixes:
Compliance engine:
DOME-7510 - IAM Role combined policies fix.
Clarity:
DOME-6084 - Performance improvements.
AWS Onboarding:
Updated the dome9-read-only policy in order to support WAF for web ACL [/wiki/spaces/DG/pages/265781396].
Bug fixes:
Compliance engine:
DOME-7480 - Dashboard - Improved exporting large files to CSV.
Policy Reports and Security groups page:
DFT-171 - UI text and titles fixes.
Compliance Bundles change
We have expanded and updated our compliance bundles!
As security threats continue to evolve, we want to ensure that you are adhering to up-to-date compliance requirements and security best practices in the public cloud.
As part of this commitment, we are constantly updating our compliance bundles included in our product.
We have made the following enhancements to our compliance module.
1. Added 5 new bundles for additional GCP and Azure coverage:
- Azure CIS Foundations v. 1.0.0
- Azure NIST 800-53 Rev 4
- Azure PCI-DSS 3.2
- Azure GDPR Readiness
- GCP NIST 800-53 Rev 4
- GCP PCI-DSS 3.2
2. Added new rules to include additional security guidelines
3. Updated some existing rules / bundles mappings including the following bug Fixes
- DFT-154 - Update Route53 hosted zone check
- DFT-152 - Typo in PCI bundle (default')
- DFT-138 - Remove Security Group checks from S3 bundle
New Findings in Continuous Compliance Scheduled Reports
New Findings being sent to SIEM system
Bug fixes:
Security Group page:
DFT-94 - Dome9 Description text fix.
Bug fixes:
Compliance engine:
DOME-7474 - Dashboard - Failed to trigger download CSV file.
Clarity
DFT-169 - VPC without assets fix.
Compliance engine:
ElastiCache entity added tags support.
Bug fixes:
Clarity
DFT-14 - Peered VPC assets fix.
Compliance engine:
Added List<Entity> rules support.
Added GroupBy [object] rules support.
Examples:
Ensure no more than 5 IAM Admins exist in any particular account.
List<IamUser> should have items with[name like 'admin' or name like 'administrator'] length() < LIMIT
To detect if your account is near the EC2 Security Group Limit in a VPC.
List<SecurityGroup> should have items groupBy [vpc.id] contain-all [values length() < LIMIT]
Bug fixes:
Compliance engine - Assessments history
DFT-2 - User Permissions fix.
Bug fixes:
DFT-4 - GSL query 'Region should have hasCloudTrail=true' returns invalid results after 'isMultiRegion' is toggled OFF
DFT-135 - Setting default access lease time does not reflect or update 'GET ACCESS' default time.
Cloud accounts:
Added support for Azure tamper protection view.
Audits and Alerts page:
Added Invalid credentials alert for Azure.
Compliance engine - Bundle bug fixes:
DFT-125 - Fixing typo in description to shouldn't (EC2 Instance there shouln't be any High level findings in Inspector Scans).
DOME-7391 - Update name of the s3 to stay in 1 line to " AWS Dome9 S3 Bucket Security"
Compliance engine - Assessment history:
Added triggered by column.
Compliance engine:
KMS entity added tags support.
Home page:
Optimized the account statistics on the homepage (Network, IAM and S3 information).
Compliance engine:
AWS Instance entity added Image details support (Image name, Is public, owner Id, etc').
AWS Onboarding:
Updated the dome9-read-only policy in order to support DynamoDB and ElasticCache tags [/wiki/spaces/DG/pages/265781396].
Compliance engine:
Redshift entity added tags support.
Compliance engine:
Kinesis entity added tags support.
Lambda entity added tags support.
EFS entity added tags support.
Bug Fixes:
DFT-127 - Cross system - Export to CSV component fix.
DOME-6868 - Security groups page - Clone security groups - peered security groups fix.
Compliance Bundles change
Compliance Engine bundle management will be based on the unified mapping of the Dome9 compliance checks to various security and compliance frameworks.
New Findings in Continuous Compliance Scheduled Reports
New Findings being sent to SIEM system
Compliance engine:
RDS entity added tags support.
Bug Fixes:
DFT-113 - Compliance engine - Edit Bundle JSON - UI freeze.
DFT-114 - Protected Assets - Roles info data validation fix.
DFT-121 - IAM Reports - Fixed role entity managed policies support.
Compliance engine:
Added GDPR Readiness bundle.
Added NIST 800-53 Rev 4 bundle.
Account page:
Billable assets definition and link to protected assets.
Bug Fixes:
DOME-7257 - Compliance engine - Navigation exceptions from compliance reports.
DOME-7258 - IAM Reports - Fixed role entity support.
AWS Onboarding:
Updated the dome9-read-only policy in order to support Guard duty [/wiki/spaces/DG/pages/265781396].
Cloud Accounts:
Added Validate all permissions button, will try to validate permissions on all of the missing permissions cloud accounts.
Bug Fixes:
DOME-7177 - Compliance engine - fixed tags result output.
Compliance engine - S3 Bucket Security Posture:
This bundle has been updated to include the rule - S3 Buckets - without server-side-encryption enabled.
Compliance engine - Dome9 AWS Dashboards policy:
S3 Buckets - without server-side-encryption enabled - expanded rule to support all server side encryption types.
Bug Fixes:
DOME-6913 - Fixed tab panels items when refreshing page.
DOME-6985 - S3 Buckets - without server-side-encryption enabled rule - causes false positives for customers
AWS Onboarding:
Updated the dome9-read-only policy in order to support Kinesis [/wiki/spaces/DG/pages/265781396].
Clarity:
Added EFS asset count and attached security groups icon
Bug fixes:
Clarity
DOME-6378 - Fixed internal network RFC6890 support.
DOME-6048 - Fixed RDS and Redshift state coloring.
DOME-7018 - Fixed un-managed VPC display for wrong security groups.
Compliance dashboard:
Export all findings to CSV button - Create failed entities CSV report for all cloud accounts and bundles.
Bug fixes:
DOME-7023 - Fixed menu page selection marker.
Compliance engine:
GCP VMInstance entity - added labels attributes
Cloud Accounts:
Divided Update permissions to Validate permissions and Run permissions wizard buttons,
Validate permissions will validate the missing permissions, run permissions wizard is a step by step guide to update the permissions.
Compliance engine:
RDS entity - added Encryption key attributes,which allow to verify if the RDS is encrypted and its encryption attributes.
For example: RDS should have encryptionKey.enabled=true
Compliance engine:
Export to CSV report - Added Cloud account ID and Name.
Account page:
Improvements for AWS marketplace plans.
Bug Fixes:
DOME-6939 - Cloud accounts page - Edit credentials fix for empty cloud accounts.
DOME-6927 - Fixed several broken links to the cloud account page.
DOME-6990 - Fixed AWS LogGroups fetching partial data issue.
Compliance engine:
Added CIS AWS Foundations v. 1.1.0 bundle [/wiki/spaces/DG/pages/217972857].
Bug Fixes:
DOME-6473 - ICMP ports on GCP causing incorrect compliance results fix.
DOME-6798 - Fixed Typo in SQLDB property in compliance engine.
Compliance engine:
IamUser entity - added "virtualMfaEnabled" attribute,which allow to verify if the Iam User have virtual MFA device enabled.
For example: IamUser should have virtualMfaEnabled=true
Cloud Accounts:
Changed "Delete" account button to "Remove".
For additional information visit our documentation [/wiki/spaces/DG/pages/177242193].
Compliance engine:
Added system audits for assessments runs
EFS entity - added "encryptionKey" attribute,which allow to verify if the EFS encrypted and the encryption key parameters.
VPC entity - added "hasFlowLogs" attribute, which allow to verify if the VPC have flow logs or not.
Account page:
UI improvements and fixes for new AWS metered plans.
Bug Fixes:
DOME-6901 - VPC Flow Logs - Fixed undefined values on VPC selector
DOME-6907 - Account page - Fix old Plans support on the UI.
Cloud Accounts:
Improved and optimized the UI, added filtering and cloud account state
For additional information visit our documentation [/wiki/spaces/DG/pages/177242193].
Account page:
UI improvements for new AWS metered plans.
Compliance engine:
EFS - added "Encryption" attribute,which allow to verify if the EFS encrypted.
For example: EFS should have encrypted=true
CIS AWS Foundations bundle updates (CIS Amazon Web Services Foundations Benchmark 1.0.0)
Updating the remediation field, removing old PDF from rules remediation, and changing Bundle description.
Bug fixes:
Clarity - VPC Flow Logs UI fixes.
Cross system:
Update password policy to require complex passwords
Bug fixes:
Clarity bug fixes.
Bug fixes:
Add cloud account using API fix.
Left side menu - links fix.
AWS Onboarding:
Updated the dome9-read-only policy due to AWS SecurityAudit Policy update.
Cloud account page:
Added improved missing permissions mechanism.
Account page:
Added updated payment plans.
Bug fixes:
small UI fixes for the compliance rule builder.
Security groups - fixing navigation issue to instances.
Bug fixes:
IAM - Improved Credentials report error handling.
Bug fixes:
Clarity - small UI fixes.