Okta and Microsoft Entra ID SCIM 2.0 support save you work
Separately maintaining user accounts in dozens of systems can be a major time suck. With Okta and Microsoft Entra ID SCIM 2.0 support in Mondoo private instances, you can reclaim that time.
Sync your users and groups automatically so the right users always have the proper access. You can now automatically:
- Provision access for new team members when they start
- Manage employees' administrative access to Mondoo spaces and organizations
- Meet compliance requirements for removing access for terminated team members
- Deploy with the Mondoo Terraform provider
To learn more about enabling SCIM 2.0 support, talk with a Mondoo team member.
Prioritizing and fixing CVEs and advisories just got easier
Automate CVE remediation
Mondoo does more than just reveal the critical software vulnerabilities that threaten your infrastructure. We also provide Ansible and Bash remediation scripts for you to automate patching your systems.
Prioritize remote exploit prevention
Remote code execution opportunities are like Trojan horses in your organization, waiting for exploits. With the new remote execution risk attribute for CVEs and advisories, you can now prioritize and patch these highest risks to your business before attackers find them.
Mondoo lets you sort by and search for CVEs and vendor advisories that are known to be susceptible to remote code execution over the network.
Find and fix the security risks that pose the biggest threat to your business.
Easily access advisory resources
When you need to learn more about an advisory, Mondoo has you covered. With direct links to the vendor's advisory information, advisory education and remediation are only a click away.
Access the data you need with resource improvements
asset
We added a new annotations field.
aws
We improved handling of integer values in AWS. Fields representing maximum/minimum values, such as aws.cloudfront.distribution.origin.connectionTimeout
, now return 0
when no value has been set. When a field represents a port value, such as aws.rds.dbInstance.port
, Mondoo now represents unset values as -1
.
aws.cloudtrail.trails
We added support for advanced selectors in the eventSelectors
field.
aws.config
We added a new deliveryChannels
field.
aws.config.deliverychannel
This new resource has fields representing an individual AWS Config delivery channel configured within an account.
aws.iam.role
We added a new assumeRolePolicyDocument
field.
aws.iam.policies
We fixed parsing data in the attachedRoles
field.
aws.rds.dbcluster
We added three new fields:
hostedZoneId
latestRestorableTime
masterUsername
aws.rds.dbinstance
We added two new fields:
latestRestorableTime
masterUsername
gcp.project.computeService.attachedDisk
We added a new source
field.
package
- We added a new
originVersion
field on Debian Linux-based assets. - We now include version data in the
origin
field for source packages on Debian Linux-based assets.
Wolfi container package detection
Expose package information in Chainguard's Wolfi "un-distribution" with support for Wolfi's APK packages:
cnquery shell container image cgr.dev/chainguard/caddy
→ connected to Wolfi
___ _ __ __ _ _ _ ___ _ __ _ _
/ __| '_ \ / _` | | | |/ _ \ '__| | | |
| (__| | | | (_| | |_| | __/ | | |_| |
\___|_| |_|\__, |\__,_|\___|_| \__, |
mondoo™ |_| |___/ interactive shell
cnquery> packages
packages.list: [
0: package name="ca-certificates-bundle" version="1708982311:20240226-r0"
1: package name="caddy" version="1710420294:2.7.6-r4"
2: package name="wolfi-baselayout" version="1701735113:20230201-r7"
]
Filter AWS scans by region
Filter cnspec command line scans by AWS region with new filter options:
cnspec scan aws --filters all:region=us-east-2
cnspec scan aws --filters region=us-east-2
cnspec scan aws --filters ec2:region=us-east-2
Thanks for this great contribution @montera82!
Secure your infrastructure with improved policies
Expanded CIS GCP Foundations policy
You no longer need multiple tools and security policies to catch security problems before they reach production. New Terraform variants in the CIS GCP Foundations benchmark policy provide a single check for both running GCP assets and the Terraform code that generates those assets. To learn more about securing Terraform code using Mondoo, read the Mondoo docs.
Endpoint detection and response policy
Our new Endpoint Detection and Response (EDR) policy lets you ensure that critical employee endpoints have EDR software installed and running. This policy checks to see if SentinelOne, ESET, or CrowdStrike is installed on macOS, Linux, and Windows systems.
Updated policy check impact scores
Prioritize the most important checks first with newly adjusted check priorities for CIS Linux distribution policies. These improved scores ensure that only the most important checks are listed as failures, so you can more easily prioritize critical work.
Improved AWS policies
We've refactored the CIS AWS Foundations benchmark policy and all our AWS Best Practices policies. Changes include improved queries and result output as well as new descriptions and remediation data.
Filter policies on assets (enhanced prioritization)
Asset policy pages now include filtering by policy types and scores so you can see exactly what policies are applied and where failures are occurring.
Query stronger with MQL enhancements
Data type conversion MQL helpers
New MQL helpers allow you to quickly convert data to the right format for your custom checks and data queries.
> int(1.23)
1
> bool(1)
true
> float(12)
12
> string(1.89)
"1.89"
> regex("w.r.d") == "world 🌎"
/w.r.d/
Plus we keep getting faster!
We introduced a new mechanism to reduce the number of calls made during asset discovery. This is especially helpful when scanning larger Kubernetes clusters. It lets cnquery and cnspec incrementally scan every asset one by one without having to scan all of them initially. This performance improvement not only drastically cuts the execution time, it also eliminates the need for reading container images twice from the system, cutting down on I/O load.
This improvement is automatically enabled for new workloads. We currently support it for container images and plan to extend it to other workloads with costly discovery steps in the future.
We work hard to make security and compliance easier
As we leap into springtime, we Mondoonauts are hard at work building new features that facilitate smart, efficient, and effective security decisions. Check back soon to learn what we're up to.