Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 5.14.0 #1635

Merged
merged 47 commits into from
May 10, 2024
Merged

Release 5.14.0 #1635

merged 47 commits into from
May 10, 2024

Conversation

fernando-gallego
Copy link
Collaborator

ScoutSuite v5.14.0

Changes:

  • Core
    • Refactored Docker images to split them by major cloud provider (AWS, Azure, GCP)
  • AWS
    • Updated Route53 transfer lock checks to add/remove TLDs
    • Multiple finding template improvements
    • Improved logic check for EBS encryption findings
    • Improved logic check for IAM policy conditions
  • Azure
    • Fixed false negatives on edge cases of Key Vault RBAC settings
    • Fixed 'Blob Containers Allowing Public Access' template
    • Fixed flase positives on 'Access Keys Not Rotated' check for Storage Accounts
  • Digital Ocean
    • Added support for scanning Digital Ocean environments, including a handful of new rules and checks. Special thanks to @asifwani and @ltoroncc

Thanks to all contributors in this release:

@x4v13r64
@ltoroncc
@asifwani
@rossja
@launchdaemon
@rdegraaf-ncc3
@rieck-srlabs

rossja and others added 30 commits September 23, 2022 20:36
Remove *.uk domains as they now support domain locks.
It seems to work but there are issues with the display; see "TKTK"
comments in .../services.ec2.regions.id.regional_settings.html.

Still needs tests.
ScoutSuite previously did not flag key vaults for which the API returned
enable_soft_delete = null. Such key vaults have neither soft-delete nor
purge protecton enabled and are also not recoverable. The check would
only flag key vaults for which enable_soft_delete = false.
ScoutSuite failed to flag key vaults where the enable_rbac_authorization
field was set to null. Through manual configuration in the Azure portal
I confirmed that RBAC Access Control is disabled if this field is set
to null.
The test scans Blob Containers, not Storage Accounts.
There is a 1:n relationship between Storage Accounts and Blob Containers.
- Updates azure-mgmt-storage to 17.0.0
- Only consider storage accounts that allow access key access for the check
- Display the access key status in the results
…ot-recoverable

Fixes 'Key Vault Not Recoverable' check
Apparently ScoutSuite makes the implicit assumption that all settings
are associated with resources, rather than directly to the region +
service. So we move the regional EBS settings into a fake resource.
This means that paths now need to include an ID for the "resource".
ltoroncc and others added 17 commits May 7, 2024 09:37
Review/Fixes for DigitalOcean to overwrite PR #1604
Update some GCP dependencies as in #1589 and pin protobuf 3.20.1 since more recent versions break GCP libs
…-update

Bugfix/route53 domain lock update
…bac-disabled

Fixes 'Key Vault Role Based Access Control Disabled' check
…ontainer-labeling

Corrected display name for 'Blob Containers Allowing Public Access'
…-accounts-without-access-keys

Improves 'Access Keys Not Rotated' check
…used-credentials

 Bugfix/1621 Improve AWS unused credential issue flagging
…y-rotation-rule-name

Improves iam-user-no-key-rotation rule
…tail-view-highlighting

Adds highlighting for "EBS Volume Not Encrypted" detail view
Update to v5.14.0
@fernando-gallego fernando-gallego self-assigned this May 10, 2024
@fernando-gallego fernando-gallego merged commit 7909f2f into master May 10, 2024
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

8 participants