Skip to content

Commit d6ebc8b

Browse files
committed
Merge branch 'develop' into release/v2.0.0
2 parents ac06368 + 3d4bdcf commit d6ebc8b

File tree

13 files changed

+1747
-176
lines changed

13 files changed

+1747
-176
lines changed

CHANGELOG.md

Lines changed: 34 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,22 @@
11
# Change Log
2+
23
All notable changes to this project will be documented in this file.
34

45
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
56
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
67

7-
## [2.0.0] - 2023-01-17
8+
## [2.0.0] - 2023-03-23
89

910
### Added
11+
1012
- New remediations contributed by 6Pillars: CIS v1.2.0 1.20
1113
- New AFSBP remediations for CloudFormation.1, EC2.15, SNS.1, SNS.2, SQS.1
1214
- Service Catalog AppRegistry integration
1315
- New support for Security Controls, finding deduplication
1416
- New support for CIS v1.4.0 standard
1517

1618
### Changed
19+
1720
- Added protections to avoid deployment failure due to SSM document throttling
1821

1922
## [1.5.1] - 2022-12-22
@@ -31,40 +34,48 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
3134
## [1.5.0] - 2022-05-31
3235

3336
### Added
37+
3438
- New remediations - see Implementation Guide
3539

3640
### Changed
41+
3742
- Improved cross-region remediation using resource region from Resources[0].Id
3843
- Added custom resource provider for SSM documents to allow in-place stack upgrades
3944

4045
## [1.4.2] - 2022-01-14
4146

4247
### Changed
48+
4349
- Fix to correct the generator id pattern for CIS 1.2.0 Ruleset.
4450

4551
## [1.4.1] - 2022-01-05
4652

4753
### Changed
54+
4855
- Bug Fix for issue [47](https://github.com/aws-solutions/aws-security-hub-automated-response-and-remediation/issues/47)
4956
- Bug Fix for issue [48](https://github.com/aws-solutions/aws-security-hub-automated-response-and-remediation/issues/48)
5057

51-
5258
## [1.4.0] - 2021-12-13
5359

5460
### Changed
61+
5562
- Bug fixes for AFSBP EC2.1, CIS 3.x
5663
- Separated Member roles from the remediations so that roles can be deployed once per account
5764
- Roles are now global
5865
- Cross-region remediation is now supported
5966
- Deployment using stacksets is documented in the IG and supported by the templates
60-
- Member account roles for remediation runbooks are now retained when the stack is deleted so that remediations that use these roles continue to function if the solution is removed
67+
- Member account roles for remediation runbooks are now retained when the stack is deleted so that remediations that use
68+
these roles continue to function if the solution is removed
6169

6270
### Added
71+
6372
- Added a get_approval_requirement lambda that customers can use to implement custom business logic
64-
- Added the ability for customers to route findings to an alterate runbook when the finding meets criteria. For example, potentially destructive remediations can be sent to a runbook that sends the finding data to Incident Manager.
73+
- Added the ability for customers to route findings to an alterate runbook when the finding meets criteria. For example,
74+
potentially destructive remediations can be sent to a runbook that sends the finding data to Incident Manager.
6575
- New remediation for AFSBP & PCI S3.5
6676

6777
## [1.3.2] - 2021-11-09
78+
6879
- Corrected CIS 3.1 filter pattern
6980
- Corrected SNS Access Policy for SO0111-SHARR-LocalAlarmNotification
7081
- Corrected KMS CMK Access Policy used by the SNS topic to allow CloudWatch use
@@ -73,34 +84,43 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
7384
## [1.3.1] - 2021-09-10
7485

7586
### Changed
76-
- CreateLogMetricFilterAndAlarm.py changed to make Actions active, add SNS notification to SO0111-SHARR-LocalAlarmNotification
87+
88+
- CreateLogMetricFilterAndAlarm.py changed to make Actions active, add SNS notification to
89+
SO0111-SHARR-LocalAlarmNotification
7790
- Change CIS 2.8 remediation to match new finding data format
7891

7992
## [1.3.0] - 2021-08-30
8093

8194
### Added
95+
8296
- New AWS Foundational Best Practices (AFSBP) support: EC2.6, IAM.7-8, S3.1-3
8397
- New CIS v1.2.0 support: 2.1, 2.7, 3.1-14
8498
- New PCI-DSS v3.2.1 Playbook support for 17 controls (see IG for details)
8599
- Library of remediation SSM Automation runbooks
86100
- NEWPLAYBOOK as a template for custom playbook creation
87101

88102
### Changed
103+
89104
- Updated to CDK v1.117.0
90105
- Reduced duplicate code
91106
- Updated CIS playbook to Orchestrator architecture
92107
- Single Orchestrator deployment to enable multi-standard remediation with a single click
93108
- Custom Actions now consolidated to one: "Remediate with SHARR"
94109

95110
### Removed
111+
96112
- AWS Service Catalog for Playbook deployment
97113

98114
## [1.2.1] - 2021-05-14
115+
99116
### Changed
117+
100118
- Corrected SSM permissions that were preventing execution of AWS-owned SSM remediation documents
101119

102120
## [1.2.0] - 2021-03-22
121+
103122
### Added
123+
104124
- New AFSBP playbook with 12 new remediations
105125
- New Lambda Layer for use by solution lambdas
106126
- New Playbook architecture: Step Function, microservice Lambdas, Systems Manager runbooks
@@ -110,25 +130,33 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
110130
- Encrypted CloudWatch logs for AFSBP state machine
111131

112132
### Changed
133+
113134
- Consolidated CDK to a single installation
114135
- Moved common/core CDK modules to source/lib
115136
- Update CDK to 1.80.0
116137

117138
## [1.1.0] - 2020-11-15
139+
118140
### Changed
141+
119142
- Added support for AWS partitions other than 'aws' (aws-us-gov, aws-cn)
120143
- Updated CDK support to 1.68.0
121144

122145
## [1.0.1] - 2020-09-18
146+
123147
### Changed
148+
124149
- Added info-level messages indicating action (CREATE/UPDATE) from the CreateCustomAction lambda
125-
- Added more stringent matching on Workflow Status and Compliance Status to CloudWatch Event Rules for Custom Actions and CloudWatch finding events (automatic trigger)
150+
- Added more stringent matching on Workflow Status and Compliance Status to CloudWatch Event Rules for Custom Actions
151+
and CloudWatch finding events (automatic trigger)
126152
- Added logging of the finding id to the lambda log for each remediation
127153
- Added region name to all IAM roles
128154
- Added region name to IAM Groups - permissions can now be granted per region
129155
- Removed statically-defined policy names for IAM Groups
130156
- Removed snapshot test from CDK unit tests
131157

132158
## [1.0.0] - 2020-08-12
159+
133160
### Added
161+
134162
- New add-on solution for AWS Security Hub with CIS v1.2.0 remediations

0 commit comments

Comments
 (0)