Skip to main content

Mondoo 8.4 is out!

ยท 4 min read
Mondoo Core Team

๐Ÿฅณ Mondoo 8.4 is out! This release includes a new way to explore asset resources, Snowflake data exports, and more!โ€‹

Get this release: Installation Docs | Package Downloads | Docker Container


๐ŸŽ‰ NEW FEATURESโ€‹

Asset resource explorerโ€‹

Use the new asset resource explorer to dive deep into the configuration of all your favorite assets in Mondoo. From the services running on Windows servers to container registries used in Kubernetes deployments, the asset resource explorer lets you navigate the critical configuration data that makes up your infrastructure.

Asset Resource Explorer

If the data output looks familiar, that's because this new feature is powered by the same MQL resources used by cnspec and cnquery on the command line. Data is automatically gathered with new-out-of-the-box inventory query packs in the Policy Hub.

Inventory Packs

Just like security policies, you can enable as many inventory packs as you'd like, and they'll run on the appropriate assets automatically. With inventory packs enabled, you'll see inventory data automatically in the new Resources tab for each asset. If you want to gather even more inventory data, you can create custom inventory packs using the hundreds of available MQL resources. See examples of inventory packs in the cnquery-packs repository.

Snowflake data exportsโ€‹

With Mondoo 8.2 we shipped our first data export integration: Google BigQuery. This week we everyone not running in GCP has reason to celebrate: new support for Snowflake data export.

Configure data exports just like other integrations in Mondoo, without installing anything in your infrastructure. They automatically export your Mondoo data daily.

Snowflake Setup

You can combine your exported Mondoo data with any other data in Snowflake and analyze it using Snowflakes's machine learning and BI features.

Snowflake Data

Automatic Kubernetes Ingress scanningโ€‹

Both cnspec and the Mondoo Kubernetes Operator now automatically scan Kubernetes Ingress resources. With the Kubernetes Best Practices policy enabled, you can also now expose expiring TLS certificates in Ingress resources.

Ingress Asset

๐Ÿงน IMPROVEMENTSโ€‹

Scan container images in .tar formatโ€‹

You can now use cnspec and cnquery to scan container images exported in .tar format with commands like docker save.

docker save luna-docs -o luna-docs.tar
cnspec scan container tar luna-docs.tar
โ†’ discover related assets for 1 asset(s)
โ†’ resolved assets resolved-assets=1

luna-docs.tar โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ” 100% score: F


Asset: luna-docs.tar
--------------------

...

Scanned 1 assets

Debian GNU/Linux 8 (jessie)
F luna-docs.tar

Expanded Okta MQL resourcesโ€‹

cnquery and cnspec now include more Okta resources so you can query and secure every aspect of your organization.

Access billing contact of Okta organizations

cnquery> okta.organization.billingContact
okta.organization.billingContact: okta.user id="12345678910" profile[email]="chris@example.com"

Access technical contact of Okta organizations

cnquery> okta.organization.technicalContact
okta.organization.technicalContact: okta.user id="12345678910" profile[email]="chris@example.com"

Gather the settings of security notification emails

cnquery> okta.organization.securityNotificationEmails
okta.organization.securityNotificationEmails: {
reportSuspiciousActivityEnabled: true
sendEmailForFactorEnrollmentEnabled: false
sendEmailForFactorResetEnabled: false
sendEmailForNewDeviceEnabled: false
sendEmailForPasswordChangedEnabled: false
}

Gather Okta ThreatInsight settings

cnquery> okta.organization.threatInsightSettings { * }
okta.organization.threatInsightSettings: {
excludeZones: [
0: okta.network name="LegacyIpZone" type="IP"
]
created: 2022-11-01 18:30:34 +0000 UTC
action: "audit"
lastUpdated: 2023-04-02 20:29:19 +0000 UTC
}

Gather Okta networks

okta.networks { * }
okta.networks: [
0: {
locations: []
lastUpdated: 2022-11-01 18:30:35 +0000 UTC
asns: []
created: 2022-11-01 18:30:35 +0000 UTC
id: "12345678910"
type: "IP"
gateways: []
status: "ACTIVE"
system: true
proxies: []
proxyType: ""
usage: "BLOCKLIST"
name: "BlockedIpZone"
}
1: {
locations: []
lastUpdated: 2022-11-01 18:30:35 +0000 UTC
asns: []
created: 2022-11-01 18:30:35 +0000 UTC
id: "12345678910"
type: "IP"
gateways: []
status: "ACTIVE"
system: true
proxies: []
proxyType: ""
usage: "POLICY"
name: "LegacyIpZone"
}
2: {
locations: [
0: {
country: "AF"
}
]
lastUpdated: 2023-04-02 18:58:13 +0000 UTC
asns: []
created: 2023-04-02 18:58:13 +0000 UTC
id: "12345678910"
type: "DYNAMIC"
gateways: []
status: "ACTIVE"
system: false
proxies: []
proxyType: "TorAnonymizer"
usage: "POLICY"
name: "Test"
}
]

๐Ÿ› BUG FIXES AND UPDATESโ€‹

  • Add missing impact scores to policies.
  • Improve setup and remediation instructions in the Okta Organization Security by Mondoo policy
  • Fix failures in Linux Security by Mondoo policy's Ensure auditing for processes that start prior to auditd is enabled check. Thanks @micheelengronne!
  • Fix Linux Security by Mondoo policy's Ensure sudo logging is enabled check to support configs in the /etc/sudoers.d directory. Thanks @micheelengronne!
  • Fix failures in Linux Security by Mondoo policy's Ensure mail transfer agent is configured for local-only mode check.
  • Improve the reliability of multiple CIS policies.