release/v1.11.0
Release notes:
Bug fixes (Azure Remediation jobs):
- Close Port 22 for a Network Security Group (azure_netw - Close Port 3389 for a Network Security Group (azure_network_security_group_close_port_3389) Rule ID: 5c8c267e7a550e1fb6560c9c
- Restrict UDP access from Internet (azure_security_udp_access_restricted_from_internet) Rule ID: 4e27676b-7e87-4e2e-b756-28c96ed4fdf8
- Close Port 22 for a VM (azure_vm_close_port_22) Rule ID: d7a3ad03-860c-4928-9ba8-789e84a835be
- Enable DDoS protection for Virtual Network (azure_security_center_enable_ddos_protection) Rule ID: 3abf3147-ea53-4302-b237-caab4d764c77
Bug fixes (AWS Remediation jobs):
- Enable encryption for Cloudtrail logs (aws_cloudtrail_logs_encrypted) Rule ID: 5c8c25e47a550e1fb6560bac
- Remove Network ACL Rules that allows public access to administration ports (3389 and 22) (aws_ec2_administration_ports_ingress_allowed) Rule ID: 1ec4a1f2-3e08-11eb-b378-0242ac130002
- Close Port 11211 for all Security Groups associated with an EC2 Instance (aws_ec2_close_port_11211) Rule ID: bd9d77b6-635d-4e06-9760-8957d8eaeb38
- Configure default Security Group to restrict all access (aws_ec2_default_security_group_traffic) Rule ID: 5c8c25f37a550e1fb6560bca
- Set minimum password length for an AWS account (aws_iam_password_policy_min_length) Rule ID: 5c8c260b7a550e1fb6560bf4
- Set Password Reuse Prevention Policy for an AWS Account (aws_iam_password_reuse_prevention) Rule ID: 5c8c26107a550e1fb6560bfc
- Enables KMS automated key rotation (aws_kms_key_rotates) Rule ID: 5c8c26217a550e1fb6560c12
- Close Port 1433 for all Security Groups associated with an EC2 Instance (ec2_close_port_1433) Rule ID - 5c8c26417a550e1fb6560c3d
- Close Port 1521 for all Security Groups associated with an EC2 Instance (ec2_close_port_1521) Rule ID - 5c8c26417a550e1fb6560c3e
- Close Port 20 for all Security Groups associated with an EC2 Instance (ec2_close_port_20) Rule ID - 5c8c263d7a550e1fb6560c39
- Close Port 21 for all Security Groups associated with an EC2 Instance (ec2_close_port_21) Rule ID - 5c8c263d7a550e1fb6560c3a
- Close Port 22 for all Security Groups associated with an EC2 Instance (ec2_close_port_22) Rule ID - 5c8c26417a550e1fb6560c3f
- Close Port 23 for all Security Groups associated with an EC2 Instance (ec2_close_port_23) Rule ID - 5c8c263e7a550e1fb6560c3b
- Close Port 27017 for all Security Groups associated with an EC2 Instance (ec2_close_port_27017) Rule ID - 5c8c26427a550e1fb6560c40
- Close Port 3306 for all Security Groups associated with an EC2 Instance (ec2_close_port_3306) Rule ID - 5c8c26427a550e1fb6560c41
- Close Port 3389 for all Security Groups associated with an EC2 Instance (ec2_close_port_3389) Rule ID - 5c8c26437a550e1fb6560c42
- Close Port 5439 for all Security Groups associated with an EC2 Instance (ec2_close_port_5439) Rule ID - 5c8c26447a550e1fb6560c44
- Close Port 5601 for all Security Groups associated with an EC2 Instance (ec2_close_port_5601) Rule ID - 4823ede0-7bed-4af0-a182-81c2ada80203
- Close Port 8080 for all Security Groups associated with an EC2 Instance (ec2_close_port_8080) Rule ID - 5c8c26407a550e1fb6560c3c
- Close Port 9200, 9300 for all Security Groups associated with an EC2 Instance (ec2_close_port_9200_9300) Rule ID - 04700175-adbe-49e1-bc7a-bc9605597ce2
- Enable S3 Access Logging (s3_enable_access_logging) Rule ID - 5c8c265e7a550e1fb6560c67
- Close Port 22 for a Security Group (security_group_close_port_22) Rule ID - 5c8c25ec7a550e1fb6560bbe
- Close Port 3389 for a Security Group (security_group_close_port_3389) Rule ID - 5c8c25ef7a550e1fb6560bc4
- Close Port 5432 for a Security Group (security_group_close_port_5432) Rule ID - 5c8c25f07a550e1fb6560bc6