What’s new in Sysdig – September 2021

By Chris Kranz - SEPTEMBER 28, 2021

SHARE:

Facebook logo LinkedIn logo X (formerly Twitter) logo

Welcome to another monthly update on what’s new from Sysdig! Happy Janmashtami! Shanah Tovah! 中秋快乐!

With lockdown lifting by varying degrees across the world, we hope you had a safe but pleasant holiday! It has certainly been long overdue. Here at Sysdig, we celebrated Labor Day in the USA with an extended weekend and a well being day for the team. It’s important for everyone to get the opportunity to recharge and make the most of the final summer days (for those in the northern hemisphere anyway!). We hope you’ve had similar opportunities, and managed to get the kids packed off and back to school.

Over in the community, a few of us were involved in Kubernetes Community Days UK. If you missed this live, you can catch up on some of the awesome talks on their YouTube channel. The KCD events around the world are a great way to connect with some folks local to you that are working in the cloud-native world. Maybe you’re looking for some advice and guidance, maybe just interested in what others are doing, or maybe you’re looking at a career move and want to know who’s doing cool stuff! Whatever your reason, the KCD and Cloud-Native communities are great to get involved with and they’re all very welcoming.

From a release perspective, this month was all about compliance. We’ve been on a roll and we’ve been expanding the compliance coverage within Sysdig. We really hope you find this useful. Feedback on how you’re using Sysdig and our updated features is always very welcome!

As always, please go review our own Release Notes for more details on product updates, and ping your local Sysdig contact if you have questions about anything covered in here.

Sysdig Secure

New and Updated Compliance Standards

Sysdig Secure has added new and updated compliance standards. See also: Compliance

Updates to PCI DSS v3.2.1 Compliance for Workload

We have implemented some changes to the PCI DSS v3.2.1 for workload compliance checks. The control coverage for PCI is now: 1.1.2, 1.1.3, 1.1.5, 1.1.6.b, 2.2, 2.2.a, 2.2.1, 2.2.2, 2.4, 2.6, 4.1, 6.1, 6.2, 6.4.2, 6.5.1, 6.5.6, 6.5.8, 7.2.3, 10.1, 10.2, 10.2.1, 10.2.5, 10.2.7, 10.5.5, 11.5.1

Checks added:

  • Check for Network Security enabled added to controls 1.1.2, 1.1.3 and 1.1.5
  • Check for Kubernetes audit enabled added to controls 4.1, 6.4.2 and 6.5.8

Rules added:

  • Rule Outbound or Inbound Traffic not to Authorized Server Process and Port added to control 2.2.1
  • Rule Attach to cluster-admin Role added to controls 7.2.3 and 10.5.5
  • Rules EphemeralContainers Created and Terminal shell in container added to controls 10.1 and 10.2.1
  • Rules ClusterRole With Pod Exec Created, ClusterRole With Wildcard Created, and ClusterRole With Write Privileges Created added to control 10.2
  • Rule Launch Privileged Container added to control 10.2.5
  • Rules Container Drift Detected (chmod) and Container Drift Detected (open+create) added to control 11.5.1

Rules removed:

  • Rule All K8s Audit Events rule removed from controls 10.1, 10.2, 10.2.1, 10.2.7

New PCI DSS v3.2.1 Compliance for AWS

The PCI Quick Reference describes the full range of controls required to pass a PCI 3.2 audit. In this release, Sysdig Secure will add the following controls.

For AWS protection: 2.2, 2.2.2, 10.1, 10.2.1, 10.2.2, 10.2.5, 10.2.6, 10.2.7, 10.5.5, 11.4

New AWS Well Architected Framework Compliance

The AWS Well Architected Framework whitepaper defines best practices to build secure, high-performing, resilient, and efficient infrastructure for applications and workloads.

For workload protection, Sysdig Secure will check the following sections: OPS 4, OPS 5, OPS 6, OPS 7, OPS 8, SEC 1, SEC 5, SEC 6, SEC 7, REL 2, REL 4, REL 5, REL 6, REL 10, PERF 5, PERF 6, PERF 7

For AWS protection, Sysdig Secure will check the following sections: OPS 6, SEC 1, SEC 2, SEC 3, SEC 8, SEC 9, REL 2, REL 9, REL 10

New AWS Foundational Security Best Practices v1 (FSBP) Compliance

AWS Foundational Security Best Practices v1 (FSBP) describes the full range of controls to detect when your deployed accounts and resources deviate from security best practices.

For AWS protection, Sysdig Secure will check the following sections: AutoScaling.1, CloudTrail.1, Config.1, EC2.6, CloudTrail.2, DMS.1, EC2.1, EC2.2, EC2.3, ES.1, IAM.1, IAM.2, IAM.4, IAM.5, IAM.6, IAM.7, Lambda.2, GuardDuty.1

New NIST 800-171 rev2 Compliance

The National Institute of Standards and Technology (NIST) Special Publication 800-171 rev2 describes the full range of controls required to pass a NIST 800-171 audit. It provides agencies with recommended security requirements for protecting the confidentiality of Controlled Unclassified Information (CUI) when the information is resident in nonfederal systems and organizations.

For workload protection, Sysdig Secure will check the following sections: 3.1.1, 3.1.2, 3.1.3, 3.1.5, 3.1.6, 3.1.7, 3.1.12, 3.1.13, 3.1.14, 3.1.15, 3.1.16, 3.1.17, 3.1.20, 3.3.1, 3.3.2, 3.3.5, 3.3.8, 3.3.9, 3.4.3, 3.4.5, 3.4.6, 3.4.7, 3.4.9, 3.5.1, 3.5.2, 3.11.2, 3.12.1, 3.13.1, 3.13.2, 3.13.3, 3.13.4, 3.13.5, 3.13.6, 3.13.8, 3.14.1, 3.14.2, 3.14.3, 3.14.4, 3.14.5, 3.14.6, 3.14.7

For AWS protection, Sysdig Secure will check the following sections: 3.1.1, 3.1.2, 3.1.3, 3.3.1, 3.3.2, 3.3.7, 3.5.7, 3.5.8, 3.14.6, 3.14.7

New Terraform Onboarding Options for Secure for cloud

Users can now onboard Sysdig Secure for cloud with their AWS accounts (single or organizational) using Terraform. See the feature description and the deployment/onboarding instructions.

Date Columns Added for Scheduled Scanning Reports

In Sysdig Secure, the Scheduled Reports for Scanning now display additional vulnerability metadata for both runtime and registry reports.

Specifically:

  • Disclosure date: Time when the vulnerability information was registered in the feed
  • Solution date: Time when the fix version for this vulnerability (if any) was registered in the feed

To avoid breaking compatibility with existing reports and external instrumentation, these fields will only be available for newly created reports; existing Scheduled reports (even if they are modified and saved again) will not contain these columns.

Falco Rules

v0.36.0 is the latest version. Below is a diff of changes from v0.33.0, which we covered last month.

Added the following rules:

  • Console Login Through Assume Role
  • AWS Command Executed by Untrusted User
  • Console Login Success
  • Console Login Success From Untrusted IP
  • Delete AWS user
  • Remove AWS User from Group
  • Put Object in Watched Bucket
  • Read Object in Watched Bucket
  • Unprivileged Delegation of Page Faults Handling to a Userspace Process

Added new / updated lists:

  • trusted_aws_users
  • watched_buckets
  • sysdig_commercial_images
  • falco_hostnetwork_images

Updated rules:

  • Console Login Without MFA now does not fire on assumed role
  • Console Root Login Without MFA now does not fire on assumed role
  • Add AWS User to Group now outputs the user added to the group

Added / updated macros:

  • Interactive macro updated checking the tty state. The interactive session is with proc.tty != 0

Check the Falco Rules Changelog for a full list of changes.

Cloud security posture management for GCP based on Cloud Custodian:

Sysdig adds cloud asset discovery, cloud services posture assessment, and compliance validation for Google Cloud. Cloud security teams can manage their security posture by automatically discovering cloud services, flagging misconfigurations and violations, and assessing compliance with regulatory requirements. The new CSPM features are based on Cloud Custodian, an open source tool for securing cloud infrastructure.

New Event Forwarding to Chronicle

Forward Sysdig runtime security events to Google Cloud’s Chronicle security analytics platform. It enables Chronicle users to accelerate cloud and container threat response by incorporating Sysdig data.

Sysdig Agents

Sysdig Agent

The latest Sysdig Agent release is 11.4.1. Below is a diff of updates since 11.4.0, which we covered in our last update.

This is a hotfix release.

Defect Fixes

Fixed a problem that broke app checks in agent-slim by adding the missing dependencies.

Sysdig Serverless Agent

The latest Sysdig Serverless Agent release is 2.0.0, which we covered in our last update.

Sysdig Agent – Helm Chart

The Helm Chart 1.12.8 is the latest version, which we covered in our last update.

https://charts.sysdig.com/

Changelog: https://github.com/sysdiglabs/charts/blob/master/charts/sysdig/CHANGELOG.md

Node Analyzer

Version 0.1.13 is still the latest release, which we covered in our last update.

Node image analyzer can be installed as part of the Sysdig Agent install: https://docs.sysdig.com/en/scan-running-images.html

Inline Scanning Engine

v2.4.6 is the latest release. Below is a diff of updates since v2.4.5, which we covered in our last update.

See also: Integrate with CI/CD Tools.

  • Added support for images with the (deprecated) manifest schema V1

Admission Controller

v3.7.0 is the latest release. Below is a diff of updates since v3.4.1, which we covered in our last update.

  • Add dry-run mode for Admission Controller
  • Enable Kube Run detections on AC
  • Notify events to Sysdig Secure only once
  • Show workload name on Sysdig Secure event

https://docs.sysdig.com/en/admission-controller.html

SDK, CLI and Tools

Sysdig CLI

v0.7.14 is still the latest release. Below is a diff of updates since v0.7.12, which we covered in our last update.

  • backup/restore: Allow restoration with only one provided token
  • Solve policy event formatting when rule has no tags

https://github.com/sysdiglabs/sysdig-platform-cli/releases/tag/v0.7.14
https://sysdiglabs.github.io/sysdig-platform-cli/

Python SDK

v0.16.2 is still the latest release, which we covered in our last update.

https://github.com/sysdiglabs/sysdig-sdk-python/releases/tag/v0.16.2

Terraform Provider

v0.5.20 is the latest release. Below is a diff of updates since v0.5.16, which we covered in our last update.

  • Allow enabling/disabling of benchmark tasks using the enabled field for sysdig_secure_benchmark_task
  • Add aws_account_id and aws_role_name attributes to the secure_trusted_cloud_identity datasource
  • Add validation to cloud_provider
  • Add Benchmark Task resource
  • Fix Sysdig Secure Cloud sysdig_secure_trusted_cloud_identity datasource provided identity ARN
  • Adds support to handle Sysdig Secure Cloud configuration
    • resources (sysdig_secure_cloud_account) to be used with terraform-aws|gcp|azure-cloudvisionmodules
    • datasources (sysdig_secure_trusted_cloud_identity)

Documentation

Falco VS Code Extension

v0.1.0 is still the latest release.

https://github.com/sysdiglabs/vscode-falco/releases/tag/v0.1.0

Sysdig Cloud Connector

v0.8.5 of the Sysdig Cloud Connector was released, we covered v0.8.1 last month.

Here are some highlights of the differences between these versions:

New Features

  • Added compliance standards tags to rules
  • admission: add kube audit – attach command detection
  • New rules for AWS requested by customers
  • AWS command executed by untrusted user new rule
  • cloud-scanning: Update Organizational Multi Account ECR and ECS scanning
  • cloud-scanning: Set up organization assume role for s3 bucket
  • scanning/aws: Now the scanning replaces the existing pipeline in CodeBuild, with an existing one from the binary. This will make future updates easier since the scanning logic is embedded in the binary, instead of relying on the deployed one with CFT/Terraform.

Bug Fixes

  • Check value before using it to avoid panic when parsing aws.user
  • Fix an integration test when writing logs to stackdriver
  • Use appropriate username in AWS event_builder
  • Add some delay before sending attach events to activity audit
  • Correct pipeline configured with skipTLS
  • Send correct rule name to event feed
  • evaluator: Do not error on empty slice field. Now, it does not error on empty slice fields being extracted and adds more logging for debugging the reason why the field value has not been extracted.
  • Remove azure activity log path references
  • Use the user instead of user name in azure rules

Check the full list of changes to get all the details.

Sysdig Secure Inline Scan for Github Actions

v3.2.0 is the latest release, which we covered in our last update.

https://github.com/marketplace/actions/sysdig-secure-inline-scan

Sysdig Secure Jenkins Plugin

v2.1.11 is the latest release, which we covered in our last update.

https://plugins.jenkins.io/sysdig-secure/

New Website Resources

Blogs

Webinars

Other Resources

Subscribe and get the latest updates