Releases: aws-solutions/automated-security-response-on-aws
Releases · aws-solutions/automated-security-response-on-aws
v1.5.0
[1.5.0] - 2022-05-31
Added
- New remediations - see Implementation Guide
Changed
- Improved cross-region remediation using resource region from Resources[0].Id
- Added custom resource provider for SSM documents to allow in-place stack upgrades
Refer to changelog for more information
Full Changelog: v1.4.2...v1.5.0
Release v1.4.2
Changed
- Fix to correct the generator id pattern for CIS 1.2.0 Ruleset.
Release v1.4.1
Release v1.4.0
Changed
- Bug fixes for AFSBP EC2.1, CIS 3.x
- Separated Member roles from the remediations so that roles can be deployed once per account
- Roles are now global
- Cross-region remediation is now supported
- Deployment using stacksets is documented in the IG and supported by the templates
- Member account roles for remediation runbooks are now retained when the stack is deleted so that remediations that use these roles continue to function if the solution is removed
Added
- Added a get_approval_requirement lambda that customers can use to implement custom business logic
- Added the ability for customers to route findings to an alterate runbook when the finding meets criteria. For example, potentially destructive remediations can be sent to a runbook that sends the finding data to Incident Manager.
- New remediation for AFSBP & PCI S3.5
Release v1.3.2
Changed:
- Corrected CIS 3.1 filter pattern
- Corrected SNS Access Policy for SO0111-SHARR-LocalAlarmNotification
- Corrected KMS CMK Access Policy used by the SNS topic to allow CloudWatch use
- EvaluationPeriods for CIS 3.x alarms changed from 240 (20 hours) to 12 (1 hour)
Release v1.3.1
Changed
- CreateLogMetricFilterAndAlarm.py changed to make Actions active, add SNS notification to SO0111-SHARR-LocalAlarmNotification
- Change CIS 2.8 remediation to match new finding data format
Release v1.3.0
Added
- New AWS Foundational Best Practices (AFSBP) support: EC2.6, IAM.7-8, S3.1-3
- New CIS v1.2.0 support: 2.1, 2.7, 3.1-14
- New PCI-DSS v3.2.1 Playbook support for 17 controls (see IG for details)
- Library of remediation SSM Automation runbooks
- NEWPLAYBOOK as a template for custom playbook creation
Changed
- Updated to CDK v1.117.0
- Reduced duplicate code
- Updated CIS playbook to Orchestrator architecture
- Single Orchestrator deployment to enable multi-standard remediation with a single click
- Custom Actions now consolidated to one: "Remediate with SHARR"
Removed
- AWS Service Catalog for Playbook deployment
Release v1.2.1
Changed
- Corrected SSM permissions that were preventing execution of AWS-owned SSM remediation documents
Release v1.2.0
Added
- New AFSBP playbook with 12 new remediation
- New Lambda Layer for use by solution lambdas
- New Playbook architecture: Step Function, microservice Lambdas, Systems Manager runbooks
- Corrected anonymous metrics to log only on final state (FAILED or RESOLVED)
- Added logging to put anonymous metrics in solution logs as an audit trail
- Corrected the anonymous metrics UUID to use standard 8-4-4-4-12 format
- Encrypted CloudWatch logs for AFSBP state machine
Changed
- Consolidated CDK to a single installation
- Moved common/core CDK modules to source/lib
Release v1.1.0
[1.1.0] - 2020-11-15
Changed
- Added support for AWS partitions other than 'aws' (aws-us-gov, aws-cn)
- Updated CDK support to 1.68.0