Community
Questions Library
Docs
Blog
Events
Swag
Github
Slack
JupiterOne
Discussions
Release Notes
Contact Us
JupiterOne 2021.70 Release - AskJ1 Community
<main> <article class="userContent"> <p>2021-05-05</p> <h2 data-id="new-features-and-improvements">New Features and Improvements</h2> <ul><li><p>Added compliance controls library, users can now customize their SOC 2 framework by importing/creating their own controls through the UI</p></li> <li><p>Users are now able to edit any property on an entity via the entity drawer, even if it was imported from an integration</p></li> <li><p>Users can now report issues/suggestions through the J1 app by clicking the help icon and then selecting “Report an Issue”</p></li> </ul><h2 data-id="integrations">Integrations</h2> <h3 data-id="aws">AWS</h3> <ul><li><p>Added config fields <code class="code codeInline" spellcheck="false" tabindex="0">useRoleChaining</code>, <code class="code codeInline" spellcheck="false" tabindex="0">intermediateRoleArn</code>, and<br><code class="code codeInline" spellcheck="false" tabindex="0">intermediateExternalId</code> to support Role Chaining. This allows customers to<br> maintain a single role for JupiterOne that is then used to assume different<br> roles across many accounts. See the integration configuration UI for more<br> details.</p></li> <li><p>Allow customers to provide <code class="code codeInline" spellcheck="false" tabindex="0">externalId</code> when creating integration instances<br> through the API. The value will be limited to use within a single JupiterOne<br> account.</p></li> <li><p>Parse IAM username from policy conditions.</p></li> <li><p>Add support for custom target filter keys in policy principal entity mapping<br> to more accurately map permissions to existing entities if they exist.</p></li> <li><p>Account for policy statements with Condition but no Principal when building<br> resource permission relationships.</p></li> <li><p>Set normalized retentionPeriod property on DataStore entities to simplify<br> querying.</p></li> <li><p>Began adding <code class="code codeInline" spellcheck="false" tabindex="0">accountId</code> property to all entities. New integration instances<br> benefit immediately, existing integrations will see the property added to<br> types in the coming weeks.</p></li> <li><p>Parse SNS Topic Policy and build permission relationships.</p></li> <li><p>Stopped calling <code class="code codeInline" spellcheck="false" tabindex="0">listTagsForResource</code> on RDS resources - tags are already<br> returned with the resource.</p></li> <li><p>Fixed missing IAM managed policy relationships to user, groups, and roles.</p></li> <li><p>Fixed bug in Route53 step that prevented ingestion of large zones.</p></li> <li><p>Various improvements to Route53 ingestion to improve performance for large<br> zones.</p></li> <li><p>Use <code class="code codeInline" spellcheck="false" tabindex="0">ResourceGroupsTaggingAPI</code> service to fetch tags for Route53 hosted zones,<br> instead of calling <code class="code codeInline" spellcheck="false" tabindex="0">getTagsForResouce</code> for every resource, to reduce number of<br> API calls.</p></li> </ul><h3 data-id="azure">Azure</h3> <ul><li><p>Fixed <code class="code codeInline" spellcheck="false" tabindex="0">404</code> error handling ingesting policy sets and policies.</p></li> <li><p>Fixed <code class="code codeInline" spellcheck="false" tabindex="0">DuplicateKeyError</code> creating relationships between policy sets and<br> policy definitions.</p></li> <li><p>Improved processing of policy definition IDs that are sourced from management<br> groups.</p></li> <li><p>Fixed errors ingesting tables/queues/fileShares of <code class="code codeInline" spellcheck="false" tabindex="0">Premium</code> tier<br> storageV1/storageV2 accounts (only <code class="code codeInline" spellcheck="false" tabindex="0">Standard</code> tier storage accounts support<br> tables/queues/fileShares).</p></li> </ul><h3 data-id="cobalt">Cobalt</h3> <ul><li><code class="code codeInline" spellcheck="false" tabindex="0">Finding.open</code> is set to <code class="code codeInline" spellcheck="false" tabindex="0">false</code> when status is <code class="code codeInline" spellcheck="false" tabindex="0">wont_fix</code></li> </ul><h3 data-id="google-cloud">Google Cloud</h3> <ul><li><p>New properties added to resources:</p> <ul><li><code class="code codeInline" spellcheck="false" tabindex="0">google_compute_instance</code></li> <li><code class="code codeInline" spellcheck="false" tabindex="0">hostname</code></li> </ul></li> <li><p>Publish integration job log event when fetching alert monitoring policies<br> fails due to <code class="code codeInline" spellcheck="false" tabindex="0">project/{PROJECT_ID} is not a workspace</code></p></li> <li><p>Publish integration job log event when when some buckets are configured with<br> "requestor pays". These buckets' policies cannot be read, so the <code class="code codeInline" spellcheck="false" tabindex="0">isPublic</code><br> property cannot be determined.</p></li> <li><p>Report an error when storage bucket policy could not be fetched</p></li> <li><p>Fixed <code class="code codeInline" spellcheck="false" tabindex="0">memoryUsage</code> and <code class="code codeInline" spellcheck="false" tabindex="0">diskUsageBytes</code> App Engine properties having <code class="code codeInline" spellcheck="false" tabindex="0">NaN</code><br> values</p></li> </ul><h3 data-id="jamf">Jamf</h3> <ul><li>Fixed error creating duplicate relationships between <code class="code codeInline" spellcheck="false" tabindex="0">jamf_computer</code> and<br><code class="code codeInline" spellcheck="false" tabindex="0">jamf_osx_configuration_profile</code>.</li> </ul><h3 data-id="onelogin">OneLogin</h3> <ul><li>Fixed broken pagination that limited ingestion of large collections<br> (<code class="code codeInline" spellcheck="false" tabindex="0">/groups</code>, <code class="code codeInline" spellcheck="false" tabindex="0">/roles</code>, and <code class="code codeInline" spellcheck="false" tabindex="0">/apps</code>).</li> </ul><h3 data-id="pagerduty">PagerDuty</h3> <ul><li>Improved messaging for errors from <code class="code codeInline" spellcheck="false" tabindex="0">validateInvocation</code>.</li> <li>Fixed broken pagination that limited ingestion of large collections.</li> </ul><h3 data-id="qualys">Qualys</h3> <ul><li>Only host detections with severities <code class="code codeInline" spellcheck="false" tabindex="0">3,4,5</code> are ingested by default. It is<br> recommended to avoid ingesting lower severity detections until you're ready to<br> process them in a meaningful way. See the configuration UI to make a change.</li> </ul><h2 data-id="bug-fixes">Bug Fixes</h2> <ul><li>Resolved some alignment issues with the compliance app</li> <li>Resolved an issue where the client was generating the vanity URL for new accounts and would sometimes run into naming conflicts with existing accounts</li> <li>Version suffixes are no longer shown on the name for compliance frameworks</li> <li>Resolved an issue where rule packs would fail to import when importing on new accounts</li> <li>Resolved an issue where certain users were only seeing partial mapping of evidence on SOC 2 frameworks</li> </ul> </article> </main>