Mondoo 11.17 is out!
๐ฅณ Mondoo 11.17 is out! This release includes Dockerfile security, all-new AWS security policies, and piles of new resources!โ
Get this release: Installation Docs | Package Downloads | Docker Container
๐ NEW FEATURESโ
New Dockerfile Security policyโ
Secure your container workloads before they run in production with our new Dockerfile Security policy. With automatic Dockerfile discovery in GitHub and GitLab and this new policy, you can evaluate the security of Dockerfiles no matter where they're hiding. Once you've secured your existing files, keep them secure with Dockerfile scanning in CI pipelines.

New CIS AWS Database Services Benchmark policyโ
Keep your most valuable business data secure with the new CIS AWS Database Services benchmark policy. This policy includes security recommendations for Amazon's most popular database services:
- Amazon Aurora
- Amazon DynamoDB
- Amazon ElastiCache
- Amazon Neptune
- Amazon RDS
- Amazon Timestream
New Mondoo Amazon Web Services (AWS) GuardDuty policyโ
Make the most of AWS GuardDuty with our new Mondoo Amazon Web Services (AWS) GuardDuty policy. This policy includes checks to ensure that GuardDuty is properly enabled and configured for EC2, EKS, IAM, Lambda, and S3 security.
Mondoo Amazon Web Services (AWS) IAM Access Analyzer policyโ
Cloud security starts with securing access to critical resources. With the new Mondoo Amazon Web Services (AWS) IAM Access Analyzer policy you can now ensure that IAM Access Analyzer is enabled and properly configured.
๐งน IMPROVEMENTSโ
Newly certified CIS benchmark policiesโ
Our CIS Red Hat Enterprise Linux, Oracle Linux, AlmaLinux, and Rocky Linux 9 policies are better than ever with updates to improve reliability and query output. Even better, these policies are now certified to pass the rigorous CIS benchmark validation process, so you can be confident they'll secure even the most complex enterprise Linux installations.
Jump right to the pointโ
Now you find what you're looking for with fewer clicks thanks to improved linking behavior on affected assets pages. Links to assets now go directly to the asset result instead of the main asset page, so you can spend your time remediating findings instead of searching for them.
Resource updatesโ
aws.dynamodb.tableโ
- New
itemsfield - New
latestStreamArnfield
aws.elasticacheโ
- New
serverlessCachesfield using the newaws.elasticache.serverlessCacheresource
aws.guardduty.detectorโ
- New
featuresfield - New
findingsfield using the newaws.guardduty.findingresource - New
tagsfield - Improve performance fetching detector details
aws.iam.accessAnalyzerโ
- Renamed from
aws.accessAnalyzerwith backward compatibility for existing policies - New
findingsfield using the newaws.iam.accessanalyzer.findingresource
aws.iam.accessanalyzer.analyzerโ
- New
regionfield - Include organization-level analyzers as well as activated but unused analyzers
aws.neptuneโ
- New resource for the AWS Neptune graph database
clustersfield using the newaws.neptune.clusterresourceinstancesfield using the newaws.neptune.instanceresource
aws.rdsโ
- New
allPendingMaintenanceActionsfield using the newaws.rds.pendingMaintenanceActionresource - Deprecate the
dbInstancesfield in favor of a newinstancesfield - Deprecate the
dbClustersfield in favor of a newclustersfield
aws.rds.dbcluster and aws.rds.dbinstanceโ
- New
activityStreamModefield - New
activityStreamStatusfield - New
certificateAuthorityfield - New
certificateExpiresAtfield - New
enabledCloudwatchLogsExportsfield - New
iamDatabaseAuthenticationfield - New
monitoringIntervalfield - New
networkTypefield - New
preferredBackupWindowfield - New
preferredMaintenanceWindowfield - Improve performance fetching security groups details
- Don't include non-RDS engine results
aws.timestream.liveanalyticsโ
- New resource with
databasesandtablesfields
aws.vpcโ
- New
namefield
azure.subscription.cloudDefenderโ
- Check the pricing tier for the Servers plan when verifying that Azure's Defender for Servers is enabled
microsoft.applicationโ
- New
certificatesfield using the newmicrosoft.keyCredentialresource - New
createdAtfield - New
descriptionfield - New
hasExpiredCredentialsfield - New
infofield - New
namefield - New
notesfield - New
secretsfield using the newmicrosoft.passwordCredentialresource - New
tagsfield
microsoft.groupโ
- New
membersfield
microsoft.userโ
- New
ownersfield
product.eolโ
Use this new resource to look up end-of-life status for common products. Example:
cnquery> product(name: "php", version: "8.1").releaseCycle { * }
product.releaseCycle: {
endOfLife: 2025-12-31 01:00:00 +0100 CET
endOfExtendedSupport: 719528 days
cycle: "8.1"
lastReleaseDate: 2024-06-06 02:00:00 +0200 CEST
name: ""
link: "https://www.php.net/supported-versions.php"
latestVersion: "8.1.29"
endOfActiveSupport: 2023-11-25 01:00:00 +0100 CET
firstReleaseDate: 2021-11-25 01:00:00 +0100 CET
}
๐ BUG FIXES AND UPDATESโ
- Fix a false negative result in the CIS Microsoft 365 policy's "Ensure a dynamic group for guest users is created" check.
- Add VPC name to asset overview information.
- Don't execute CIS Windows workstation benchmarks on server releases.
- Improve the default data returned by the
k8s.noderesource. - On the Available Frameworks page, make compliance framework descriptions more concise.
- Add an AWS CloudFormation policy variant icon on policy pages.
- Fix missing risk factors in the affected assets views.
- Show the risk score instead of CVSS scores in asset CVE tables.
- Allow sorting by risk score in tables.
- Fix Windows asset information not returning on some Windows releases if WinRM is disabled.
