icon-zwp.svg
Posture Control (ZPC)

Release Upgrade Summary (2023)

This article provides a summary of all new features and enhancements for Zscaler Posture Control (ZPC). To see scheduled maintenance updates for your cloud, visit the Trust Portal.


The following service updates were deployed to app.zpccloud.net on the following dates.

October 30, 2023
  • Feature Available
    • Enhancement to Asset Property Predicate Operators

      The asset property predicate supports two new operators for IP address and integer property types: Included In () and Not Included In ().

      To learn more, see Creating Custom Security Policies.

    • Enhancement to Ignore Compliance Rules

      ZPC allows you to configure ignore rules to exclude irrelevant compliance findings. ZPC does not display any ignore compliance findings on the compliance dashboards or reports. Using compliance ignore filters can affect ZPC's compliance score evaluation. When you ignore or include an asset or policy on ZPC, the compliance score might change.

      You can configure compliance ignore rules based on a combination of policies, asset types, regions, and accounts.

      To learn more, see Configuring an Automatic Compliance Ignore Filter.

    • Security Policies

      The following security policies are available for cloud service providers:

      • Security Policy Title
        EKS CIS - Avoid use of system:masters group
        EKS CIS - Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes cluster [Role]
        EKS CIS - Ensure Image Vulnerability Scanning using Amazon ECR image scanning or a third party provider
        AKS CIS - Restrict Access to the Control Plane Endpoint
        AKS CIS - Ensure clusters are created with Private Endpoint Enabled and Public Access Disabled
        AKS CIS - Use Azure RBAC for Kubernetes Authorization
        GKE CIS - Manage Kubernetes RBAC users with Google Groups for GKE
        GKE CIS - Ensure Kubernetes Web UI is Disabled
        K8s CIS - Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes cluster [ClusterRole]
        K8s CIS - Ensure that all Namespaces have Network Policies defined
        K8s CIS - Minimize access to create pods through Cluster Role
        K8s CIS - Minimize access to secrets through Cluster Role
        K8s CIS - Minimize access to secrets through Role
        K8s CIS - Ensure that Service Account Tokens are only mounted where necessary for Service Account
        K8s CIS - Ensure that default service accounts are not actively used
        K8s CIS - Minimize access to create pods through Role
        K8s CIS - Minimize wildcard use in ClusterRoles
        K8s CIS - Minimize wildcard use in Roles
        K8s CIS - Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture
        Close

      To learn more, see About Security Policies.

    • Trusted IP Management

      ZPC allows you to create and upload a list of trusted IP addresses used by your organization to access the public environment. ZPC excludes these trusted IPs when examining assets or identities that are publicly exposed and eliminates false alerts generated for IPs.

      The trusted IP list helps identify public exposure scenarios and distinguishes between either an exposure that serves a legitimate business purpose or one that poses a security risk.

      To learn more, see About Trusted IPs.

September 27, 2023
  • Feature Available
    • Ignore Compliance Filters

      You can selectively ignore compliance security policies or assets on your cloud deployment from being evaluated by ZPC. You can use the compliance ignore filters to perform actions such as:

      • Ignore specific compliance security policies for all AWS S3 buckets in your cloud deployment because you use S3 buckets exclusively for internal testing.
      • Ignore non-production EC2 instances for specific compliance security policies.

      Using compliance ignore filters can affect ZPC's compliance score evaluation. When you ignore or include an asset or policy on ZPC, the compliance score might change.

      To learn more, see Configuring a Compliance Ignore Filter.

September 13, 2023
  • Feature Available
    • Alert Payload with Additional Attributes Sent to IT Service Management

      Cloud and IaC alert payloads that are sent from ZPC to ITSM (Jira and ServiceNow) are enhanced to include additional attributes: Audit Procedure, Remediation, and Resource Metadata.

      To learn more, see About Alerts and Adding Alert Rules.

    • Alert Timeline

      You can view all activities of a cloud alert, the timestamp for when the alert was created and when the alert status was updated, and the ZPC user who performed the action on the alert.

      To learn more, see Viewing Alert Details.

    • AWS Local Identities Support

      ZPC offers authentication information such as access keys, passwords, or certificates for all AWS local identities. ZPC supports AWS local identities in the investigation and custom policy query creator. You can use AWS local identity predicates for queries such as:

      • Find all active identities that have an access key that expired last month.
      • Find all identities that have set up both password-based authentication and have access keys.

      To learn more, see Viewing Cloud Identity Details and Creating a New Investigation.

    • Cloud Alerts Export Option Enhancement

      You can select additional attributes to export for cloud alerts along with the alerts table to an Excel file and download the report.

      To learn more, see About Alerts and Downloading Reports.

    • Enhancements to IaC Scanning

      The following enhancements are available for IaC Scanning:

      View IaC Errors and Remediation in Code Repositories

      ZPC performs IaC scans of templates in code repositories and displays the IaC errors and remediation steps within the code, allowing developers to investigate the issues immediately.

      To learn more, see About IaC Integrations.

      IaC Scanning Support for Amazon Linux 2

      ZPC provides support for IaC CI/CD scanning on Amazon Linux 2 operating systems.

      To learn more, see Supported OS Versions for IaC Scanning.

    • Enhancements to Vulnerability Scanning

      The following enhancements are available for Vulnerability Scanning:

      Default Weekly Schedule for Vulnerability Scanning

      The default scan schedule is set to weekly for cloud workloads. The scan schedule can be switched to daily if required.

      To learn more, see Adding a Vulnerability Scanning Rule for Cloud Workloads.

      Detailed Error Messages for Failed Scans

      Comprehensive error messages are displayed for failed vulnerability scans.

      View the error message for failed scans

      To learn more, see Viewing the Cloud Workload Details.

    • Identity Type Classification Enhancement

      ZPC aligns tightly with how each cloud service provider classifies identities as human and non-human. Each cloud service provider offers different best practices for managing human identities and workload identities and enable them to safely perform actions in your cloud deployment. ZPC can check for violations of these best practices across cloud service providers and generate alerts.

      To learn more, see Understanding Identity Types.

    • Schedule an Executive Report

      You can schedule executive reports for regular distribution to specified recipients at the specified frequency.

      To learn more, see Scheduling Executive Reports and Managing Scheduled Executive Reports.

    • Security Policies

      The following security policies are available for cloud service providers:

      • Security Policy Title
        Minimize user access to Amazon ECR
        Abnormal Unused Permissions
        Close
      • Security Policy Title
        Ensure that Auto provisioning of 'Vulnerability assessment for machines' is Set to 'On'
        Ensure that Auto provisioning of 'Microsoft Defender for Containers components' is Set to 'On'
        Ensure That Microsoft Defender for IoT Hub Is Set To 'On'
        Ensure that SKU Basic/Consumption is not used on artifacts that need to be monitored (Particularly for Production Workloads)
        Ensure that Public IP addresses are Evaluated on a Periodic Basis
        Ensure that ‘Enable Infrastructure Encryption’ for Each Storage Account in Azure Storage is Set to ‘enabled’
        Ensure 'TLS Version' is set to 'TLSV1.2' for MySQL flexible Database Server
        Close
      • Security Policy Title
        Ensure the Latest Operating System Updates Are Installed On Your Virtual Machines in All Projects
        Ensure 'Access Transparency' is 'Enabled'
        Ensure Secrets are Not Stored in Cloud Functions Environment Variables by Using Secret Manager
        Ensure Essential Contacts is Configured for Organization
        Close
      • Security Policy Title
        Manage Kubernetes RBAC users with AWS IAM Authenticator for Kubernetes or Upgrade to AWS CLI v1.16.156 or greater
        Ensure clusters are created with Private Nodes
        Ensure clusters are created with Private Endpoint Enabled and Public Access Disabled
        [AKS CIS] Enable audit Logs
        [GKE CIS] Ensure use of Binary Authorization
        [GKE CIS] Ensure Legacy Authorization (ABAC) is Disabled
        [GKE CIS] Ensure Stackdriver Kubernetes Logging and Monitoring is Enabled
        [GKE CIS] Ensure clusters are created with Private Nodes
        [GKE CIS] Ensure clusters are created with Private Endpoint Enabled and Public Access Disabled
        [GKE CIS] Ensure Master Authorized Networks is Enabled
        [GKE CIS] Ensure use of VPC-native clusters
        [GKE CIS] Enable VPC Flow Logs and Intranode Visibility
        [GKE CIS] Ensure Shielded GKE Nodes are Enabled
        [GKE CIS] When creating New Clusters - Automate GKE version management using Release Channels
        [GKE CIS] Ensure Kubernetes Secrets are encrypted using keys managed in Cloud KMS
        [GKE CIS] Ensure Secure Boot for Shielded GKE Nodes is Enabled
        [GKE CIS] Ensure Integrity Monitoring for Shielded GKE Nodes is Enabled
        [GKE CIS] Ensure Node Auto-Upgrade is enabled for GKE nodes
        [GKE CIS] Ensure Node Auto-Repair is enabled for GKE nodes
        [GKE CIS] Ensure Container-Optimized OS (cos_containerd) is used for GKE node images
        [GKE CIS] Ensure legacy Compute Engine instance metadata APIs are Disabled
        [GKE CIS] Enable Customer-Managed Encryption Keys (CMEK) for GKE Persistent Disks (PD)
        [GKE CIS] Ensure GKE clusters are not running using the Compute Engine default service account
        Close
      • Security Policy Title
        Ensure user auth tokens rotate within 90 days or less
        Ensure user customer secret keys rotate within 90 days or less
        Ensure user API keys rotate within 90 days or less
        Close

      To learn more, see About Security Policies.

    • System Notifications for Vulnerability Scan Errors

      Information about vulnerability scan errors related to insufficient privileges or missing cloud resources are displayed on the Notification Center page in the ZPC Admin Portal.

      To learn more, see About System Notifications.

August 17, 2023
  • Feature Available
    • Executive Reports

      The Executive Report provides insight into the assets deployed in your cloud accounts, risks and vulnerabilities associated with the asset, policy violations and misconfigurations associated with the accounts, and much more. You can customize the report and share the report in PDF format.

      To learn more, see About the Executive Report and Managing Executive Reports.

    • Ignore Filter Rule Enhancements

      The following improvements are available for the Ignore filter:

      • The Add Ignore filter action is now available by default to the Administrator and Security Operations (SecOps) role. All other ZPC users have view-only permission. You can enable the Add Ignore Filter action for other ZPC users by adding or modifying Ignore Rules permissions in Global Modules using custom roles.
      • The Cloud Accounts attribute on the Filter Scope page is optional. You can select any one of the attributes on the Filter Scope page to define the filter.

      To learn more, see Adding Ignore Filters and Adding a Custom Role.

    • Improved Service Coverage

      ZPC now offers security posture for the following services for cloud service providers:

      • Service Name
        Microsoft.Security/assessments
        Microsoft.Compute/virtualMachineScaleSets/virtualMachines
        Close
      • Service Name
        CloudBuild - WorkerPool
        CloudBuild - Build
        CloudBuild - Trigger
        VertexAI - SpecialistPool
        VertexAI - MetadataStore
        VertexAI - Model
        VertexAI - Dataset
        Close

      To learn more, see About Cloud Asset Types and Asset Categories.

    • Investigation and Custom Policy Query Enhancements

      ZPC supports the asset property predicate which offers the ability to investigate AWS assets based on any key-value pair in the asset metadata. ZPC accommodates for array, multiple, and partial value matching.

      To learn more, see Creating a New Investigation.

    • New Remediation Attributes and Filters

      Four new remediation attributes and filters are added to the Cloud Alerts table: Supports Remediation, Remediation Allowed, Remediation Status, and Remediation Initiated By. You can see these in the main Alerts table.

      To learn more, see About Alerts and Using Filters.

    • Onboarding Private GKE Clusters

      In addition to onboarding public and hybrid clusters, ZPC supports onboarding private GKE clusters. When onboarded, ZPC can collect configuration metadata and offer cloud posture insights.

      To learn more, see Onboarding a Private Google Kubernetes Engine Cluster.

    • Security Advisory Support for Vulnerability Scanning

      Security advisories are notifications about significant new trends or developments related to threats impacting the information systems of an organization. These advisories are typically the early stages of common vulnerabilities and exposures (CVEs). ZPC scans your cloud assets and provides more information on detected security advisories along with accessible links to understand in detail about the threat methods and associated risks.

      To learn more, see About Vulnerability Management.

    • Security Policies

      The following security policies are available for cloud service providers:

      • Security Policy Title
        Ensure an Azure Bastion Host Exists
        Ensure that 'Enable key rotation reminders' is enabled for each Storage Account
        Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All Networks
        Ensure server parameter 'audit_log_events' has 'CONNECTION' set for MySQL Database Server
        Ensure server parameter 'audit_log_enabled' is set to 'ON' for MySQL Database Server
        Ensure Azure Database for MariaDB servers enable encryption in transit
        Close
      • Security Policy Title
        Ensure that Service Account Tokens are only mounted where necessary for Statefulset
        Ensure that Service Account Tokens are only mounted where necessary for DaemonSet
        Ensure that Service Account Tokens are only mounted where necessary for CronJob
        Ensure that Service Account Tokens are only mounted where necessary for Job
        Ensure that Service Account Tokens are only mounted where necessary for Deployment
        Ensure that Service Account Tokens are only mounted where necessary for Pod
        Ensure that a limit is set on pod PIDs
        Ensure that the RotateKubeletServerCertificate argument is set to true
        Ensure that the --make-iptables-util-chains argument is set to true
        Ensure that the --protect-kernel-defaults argument is set to true
        Ensure that the --authorization-mode argument is not set to AlwaysAllow
        Ensure that the --anonymous-auth argument is set to false
        Close

      To learn more, see About Security Policies.

July 31, 2023
  • Feature Available
    • Improved RBAC Features

      The role-based access control (RBAC) feature has undergone enhancements. ZPC now supports the ability for administrators to be part of multiple groups including single sign-on (SSO) groups. The concept of business units was earlier tightly coupled with defining roles, but now customers can define roles and business units separately. Business units are now mapped to groups.

      Existing administrators need not make any changes, as all the roles and permissions are updated to the new model.

      To learn more, see About Administrators, About Groups, and About Roles.

July 12, 2023
  • Feature Available
    • Admin's Last Login Details

      ZPC provides additional information by displaying the last login time of each administrator on the Administrators page. The login time indicates the time they last logged in to the ZPC Admin Portal.

      To learn more, see About Administrators.

    • Alert Payload to Third-Party Integrations

      Alerts sent from ZPC to the cloud storage service (Amazon S3, Azure Blob Storage, Splunk, or AWS Security Lake) are enhanced to include the following attributes: Audit Procedure, Remediation, and Resource Metadata.

      To learn more, see About Third-Party Integrations and Adding Cloud Alert Rules.

    • API Improvements

      Internal server errors return a correlation ID in an optional response header and the response body to support troubleshooting.

      To learn more, see API Response Codes and Error Messages.

    • Cloud Identities Enhancements

      The following enhancements are available for ZPC's Cloud Identities:

      • The Cloud Identities page now offers complete metadata, power score, authentication methods, and open alert count.
      • Clicking the open alert count directly opens the alert drawer showing all open alerts for a particular identity.

      To learn more, see About Cloud Identities.

    • Customized Default Filters

      You can define a default filter to view customized data in the ZPC Admin Portal. You can also select a saved filter as the default filter. Default filters are retained so you can view customized data every time you revisit the page or when you log out and log back in to the ZPC Admin Portal.

      To learn more, see Using Filters.

    • Improved Service Coverage

      ZPC now offers security posture for the following services for cloud service providers:

      • Service Name
        AWS::DocumentDB::DBCluster
        AWS::Neptune::DBCluster
        AWS::Neptune::DBInstance
        AWS::GuardDuty::Detector
        AWS::ServerlessRepo::Applications
        Amazon SageMaker Ground Truth
        AWS::WAF::IPSet
        AWS::WAF::RuleGroup
        AWS::WAFv2::IPSet
        AWS::WAFRegional::Rule
        AWS::WAFRegional::WebACL
        AWS::WAFRegional::IPSet
        AWS::WAFRegional::RuleGroup
        Close
      • Service Name
        Object Anchors
        Microsoft Energy Data Services
        Project Bonsai
        Remote Rendering
        Spatial Anchors
        Close
      • Service Name
        CertificateAuthorityService - CertificateRevocationList
        CertificateAuthorityService - Certificate
        CertificateAuthorityService - CaPool
        CertificateAuthorityService - Certificate Authority
        FileStoreInstance - Backup
        Secret Manager - SecretVersion
        Close
      • Service Name
        OCI WAF
        OCI Streaming
        OCI Service Connector Hub
        OCI Network Load Balance
        OCI Logging Management
        OCI File Storage
        OCI Networking
        OCI VNIC
        OCI ONS Topic
        OCI Event Rule
        Close

      To learn more, see About Cloud Asset Types and Asset Categories.

    • Investigation and Custom Policy Query Enhancements

      ZPC supports all cloud service provider supported tags in the investigation and custom policy query creator. You can use tag-based predicates for queries such as:

      • Display all EC2 instances that do not contain specific mandatory tags.
      • Set up an alert when an EC2 instance is running in production is detected with specific missing set of tags.

      To learn more, see Creating a New Investigation.

    • Manual Remediation of AWS Alerts

      ZPC supports manual remediation of AWS alerts. You can remediate single alerts, bulk alerts, or all alerts generated by a specific policy.

      To learn more, see Remediating Alerts.

    • Security Policies

      The following security policies are available for cloud service providers:

      • Security Policy Title
        Ensure 'Infrastructure double encryption' for PostgreSQL Database Server is 'Enabled'
        Ensure Application Gateway redirects HTTP traffic to HTTPS
        Ensure Azure Database for MariaDB servers backups are 'Geo-Redundant'
        Ensure Azure Database for PostgreSQL servers backups are 'Geo-Redundant'
        Ensure that Activity Log Alert exists for Create or Update Public IP Address rule
        Ensure that Activity Log Alert exists for Delete Public IP Address rule
        Ensure Azure Database for MySQL servers backups are 'Geo-Redundant'
        Ensure Azure Database for MySQL servers enable Infrastructure double encryption
        Ensure That Microsoft Defender for Resource Manager Is Set To 'On'
        Ensure That Microsoft Defender for Cosmos DB Is Set To 'On'
        Ensure That Microsoft Defender for DNS Is Set To 'On'
        Ensure That Microsoft Defender for Open-Source Relational Databases Is Set To 'On'
        Ensure the "Minimum TLS version" for storage accounts is set to "Version 1.2"
        Ensure that logging for Azure AppService 'HTTP logs' is enabled
        Ensure Azure Monitor Log Profile is collecting all activity categories
        Close
      • Security Policy Title
        GCP Artifact Registry is running an image with critical vulnerabilities
        Ensure Instance IP assignment is set to private
        Internet facing virtual machine potentially exposes a vulnerable service to the internet
        Close
      • Security Policy Title
        Ensure a notification is configured for network security group changes
        Ensure a notification is configured for user changes
        Ensure a notification is configured for changes to network gateways
        Ensure a notification is configured for VCN changes
        Ensure a notification is configured for Identity Provider changes
        Ensure a notification is configured for security list changes
        Ensure a notification is configured for IdP group mapping changes
        Ensure a notification is configured for IAM group changes
        Ensure all OCI IAM user accounts have a valid and current email address
        Ensure a notification is configured for IAM policy changes
        Ensure a notification is configured for changes to route tables
        Close

      To learn more, see About Security Policies.

    • Slack Integration

      Slack integration is available. You can receive ZPC alert notifications on Slack channels and streamline the mitigation directly into your developer tool.

      To learn more, see Integrating ZPC with Slack.

    • Vulnerability Scanning of AKS Containers

      ZPC identifies all active images used by containers in monitored Azure Kubernetes Service (AKS) clusters and scans the images for vulnerabilities. Administrators can generate vulnerability reports for the findings, run investigation queries, and set custom policies based on CVE findings.

      To learn more, see About Vulnerability Scanning.

June 19, 2023
  • Feature Available
    • Cloud Accounts Enhancements

      The following enhancements are available for cloud accounts:

      • Exporting cloud account details as an Excel file are now available with the following naming conventions:
        • Cloud Accounts: Cloudaccounts_<timestamp>
        • Organizations: Cloudaccounts_organizations_<timestamp>
        • Kubernetes: Cloudaccount_kubernetes_<timestamp>
      • The Cloud Accounts page displays a new column called Onboarded Date for each cloud account.

      To learn more, see About Cloud Accounts.

    • Container Workloads Investigation Enhancement

      The following enhancements are available for Kubernetes workload investigation:

      • ZPC supports additional predicates for investigation queries and custom policies over Kubernetes clusters. You can identify running containers as opposed to idle or stale ones and detect publicly exposed containers.
      • Kubernetes container investigation results can now be exported as an Excel file.

      To learn more, see About Investigation.

    • Improved Service Coverage

      ZPC now offers security posture for the following services for cloud service providers:

      • Service Name
        AWS Glue
        AWS Personalize
        AWS CodeArtifact
        Close
      • Service Name
        Azure Static Sites
        Virtual WAN
        Microsoft Genomics
        Azure Media Services
        Azure Maps
        Azure Web PubSub
        Azure Virtual Network Manager
        Azure Video Indexer
        Azure Time Series Insights
        Azure Spring Apps
        Azure Resource Mover
        Azure Resource Manager templates
        Close
      • Service Name
        Compute Engine - VpnGateway
        Network Intelligence Center - ConnectivityTest
        Compute Engine - NodeGroup
        NetworkConnectivity: Spoke
        NetworkConnectivity: Hub
        Run - Service
        Compute - HealthCheck
        Compute - InstanceTemplate
        Compute Engine - Address
        Compute Engine - Autoscaler
        Close

      To learn more, see About Cloud Asset Types and Asset Categories.

    • Onboarding AKS clusters with Local Authentication

      In addition to AKS clusters authenticated by Azure RBAC and Kubernetes RBAC, ZPC supports onboarding AKS clusters with local authentication.

      To learn more, see Onboarding AKS clusters with Local Authentication.

    • Security Policies

      The following security policies are available for cloud service providers:

      • Security Policy Title
        High privileged identity with access keys
        Amazon ECR is running an image with critical vulnerabilities
        Close
      • Security Policy Title
        Ensure private endpoints are used to access storage accounts
        Close
      • Security Policy Title
        High privileged identity with access keys
        GCP Container Registry is running an image with critical vulnerabilities
        Close
      • Security Policy Title
        CIS EKS - Ensure Network Policy is Enabled and set as appropriate
        CIS AKS - Ensure Network Policy is Enabled and set as appropriate
        CIS GKE - Ensure Network Policy is Enabled and set as appropriate
        Manage Kubernetes RBAC users with Azure AD
        Ensure Kubernetes Secrets are encrypted
        Verify that admission controllers are working as expected
        Ensure clusters are created with Private Nodes
        Prefer using secrets as files over secrets as environment variables [DEAMONSETS]
        Prefer using secrets as files over secrets as environment variables [STATEFULSETS]
        Prefer using secrets as files over secrets as environment variables [DEPLOYMENTS]
        Prefer using secrets as files over secrets as environment variables [CRONJOBS]
        Prefer using secrets as files over secrets as environment variables [JOBS]
        Apply Security Context to Your Pods and Containers associated with STATEFULSETS
        Apply Security Context to Your Pods and Containers associated with Deployments
        Apply Security Context to Your Pods and Containers associated with CRONJOBS
        Apply Security Context to Your Pods and Containers associated with JOBS
        Close

      To learn more, see About Security Policies.

    • Support for Amazon Security Lake Integration

      ZPC continues to support the integration with Amazon Security Lake with appropriate adjustments to align with the formal GA release that Amazon published.

      To learn more, see Integrating with Amazon Security Lake.

    • Support for Scanning Azure Workload Images Created in Compute Gallery

      ZPC now provides support for scanning cloud workload images created in Azure Compute Gallery. Previously, ZPC provided support only for scanning workload images in the Azure Marketplace.

      To learn more, see Integrating Vulnerability Management for Microsoft Azure Workloads.

    • View Container Status in Vulnerability Management

      You can easily differentiate between active and non-active containers. ZPC displays the status of the containers in the Containers tab on the Vulnerability Management page. You can also apply the Running Status filter to view either the active or non-active containers.

      To learn more, see Viewing the Containers Tab.

    • View Publicly Exposed Cloud Workloads on the Vulnerability Management Page

      You can view the list of cloud workloads that are publicly exposed on the Vulnerability Management page. You can also apply the filter to see the list of publicly exposed workloads. This allows you to prioritize these workloads and fix the vulnerabilities.

      The Vulnerability Dashboard for cloud workloads shows the summary of the top publicly exposed cloud workloads with vulnerabilities.

      To learn more, see Viewing the Cloud Workloads Tab and About the Vulnerability Dashboard.

    • View Redundant Packages and Versions

      ZPC detects vulnerabilities in the same package and version that is located in different locations. You can view the file path of packages and take the necessary action.

      To learn more, see Viewing the Cloud Workload Details.

    • View Repository Details of Scanned Container Images

      You can view the repository details of the image that is scanned for vulnerabilities. Knowing the repository in which the image resides allows you to easily locate the image and fix vulnerabilities.

      To learn more, see Viewing the Container Details.

    • Vulnerability Detection on Ubuntu

      ZPC supports the detection of vulnerabilities present in cloud workloads having Ubuntu 23.04 (Lunar Lobster) OS version.

      To learn more, see About Vulnerability Management.

    • Vulnerability Scanning of GKE Containers

      ZPC identifies all active images used by containers in monitored Google Kubernetes Engine (GKE) clusters and scans the images for vulnerabilities. Administrators can get vulnerability reports for the findings, run investigation queries, and set custom policies based on the common vulnerability and exposure (CVE) findings.

      To learn more, see Adding a Vulnerability Scanning Rule for Containers.

    • ZPC API

      ZPC supports REST APIs that allow for code-based alert retrieval. API access requires an API key, which you can create and manage in the ZPC Admin Portal. API key management entails updates to RBAC, expiration handling, and deletion of API keys.

      To learn more, see Understanding ZPC API, Getting Started, and About API Key Management.

  • Feature in Limited Availability
    • Oracle Cloud Infrastructure (OCI) Support

      ZPC extends its public cloud support with coverage for OCI services:

      • Onboard your OCI cloud accounts on ZPC.
      • Gain visibility of your OCI infrastructure's security posture on the Cloud Asset Inventory.

      To learn more, see Onboarding an Oracle Cloud Infrastructure (OCI) Tenant.

May 17, 2023
  • Feature Available
    • Alert Payload with Additional Attributes Sent to Cloud Storage Services

      Cloud and IaC alert payloads that are sent from ZPC to cloud storage services (AWS S3, Azure Blob, and AWS Security Lake) are enhanced to include additional attributes: Audit Procedure and Remediation.

      To learn more, see About Alert Rules, Adding Cloud Alert Rules, and Adding IaC Alert Rules.

    • Container Workloads Investigation

      ZPC introduces you to container workloads investigation by offering you to investigate Kubernetes workloads and gain insight into your container workload security posture without creating alerts or filtering dashboards. You can create investigations based on Kubernetes asset properties and images used by AWS EKS workloads.

      To learn more, see About Investigation.

    • Enhanced Cloud Account Filter

      The common filter Accounts now displays both the cloud account name and cloud account ID.

      To learn more, see Using Filters.

    • Generate Excel Copy for Security Policy Catalog

      You can export the security policy catalog to an Excel file from the Policies page on the ZPC Admin Portal.

      To learn more, see About Security Policies.

    • Ignore Filters Based on Clusters and Namespaces

      Alert Ignore filters can now filter on Kubernetes clusters and namespaces.

      To learn more, see Adding Ignore Filters.

    • Improved Service Coverage

      ZPC now offers security posture for the following services for cloud service providers:

      • Service Name
        S3 Glacier
        Amazon Connect
        IoT SiteWise
        AWS IoT Events
        AWS IoT Core
        AWS IoT Analytics
        AWS AppFlow
        AWS Trusted Advisor
        AWS Backup
        AWS SageMaker
        Close
      • Service Name
        Azure Red Hat OpenShift Cluster
        Azure Private Link
        Azure Kubernetes Fleet Manager
        Azure Deployment Environments
        Azure Digital Twins
        Azure Confidential Ledger
        Azure Communication Services
        Azure Cognitice Search
        Azure Virtual Machine Extensions
        Azure Automation Account Runbook
        Azure Resource Manager Templates
        Policy Definition
        Smart Alert Rules
        Azure Server Farms
        Azure SQL Virtual Mahcine
        Azure Network Watcher
        Azure Private Link
        Azure Devtest Lab Schedules
        Azure DNS
        Azure Files
        Close
      • Service Name
        DataMigration - Migration Job
        DataMigration - Connection Profile
        Dataplex - Zone
        Healthcare - Dataset
        Datastream - Stream
        Datastream - Connection Profile
        Dataplex - Lake
        Dataplex - Assets
        Cloud Scheduler - Jobs
        Cloud CDN - Backend Bucket
        Close

      To learn more, see About Cloud Asset Types and Asset Categories.

    • Public Exposure Details for Assets

      Assets that are publicly exposed carry higher risk. ZPC now shares a visual indication for publicly exposed assets in the Assets drawer and the Assets table, and includes a filter to search for such assets.

      To learn more, see About Cloud Asset Type Details and Using Filters.

    • Scanning Google Artifact Registry for CVEs

      ZPC provides support for scanning container images stored in the Google Artifact Registry (GAR). This is in addition to the previous support for scanning container images in the Google Container Registry (GCR).

      GCR is expected to be deprecated in the near future and GAR is going to be the default registry for container images and packages.

      To learn more, see Integrating Vulnerability Management for Google Cloud Platform Accounts.

    • Security Policies

      The following security policies are available for cloud service providers:

      • Security Policy Title
        EC2 Instance contains sensitive data
        EC2 Instance is running an image with critical vulnerabilities
        Ensure Amazon EFS file systems data is encrypted with KMS Customer Managed Keys (CMKs)
        Ensure Auto Renew is enabled for Route 53 domain
        Ensure Classic Load Balancer's listeners use secure protocols
        Ensure DNSSEC signing is enabled for Route 53 hosted zone
        Ensure Load Balancer's listeners use secure protocols
        Ensure Privacy Protection is enabled for Route 53 domain
        Ensure RDS DB clusters 'auto minor version upgrade' is set to 'Enabled'
        Ensure RDS DB clusters 'deletion protection' is set to 'Enabled'
        Ensure RDS DB clusters encryption is set to 'Enabled'
        Ensure RDS DB instance automated backup feature is enabled
        Ensure RDS DB instances 'auto minor version upgrade' is set to 'Enabled'
        Ensure RDS DB instances 'deletion protection' is set to 'Enabled'
        Ensure RDS DB instances are encrypted with KMS Customer Managed Keys (CMKs)
        Ensure RDS DB instances encryption is set to 'Enabled'
        Ensure SNS topica server-side encryption at rest use an up to date key
        Ensure Transfer Lock is enabled for Route 53 domain
        Ensure access logs are enabled for Classic Load Balancer
        Ensure access logs are enabled for Load Balancer
        Ensure query logging is enabled for Route 53 hosted zone
        External account can access EC2 instance contains sensitive data
        Publicly exposed EC2 instance contains sensitive data
        RDS Snapshot is shared with an external account
        Route 53 domain has expired
        Route 53 domain is about to expire in 30 days or less
        User without MFA can access EC2 instance that contains sensitive data
        Vulnerable publicly exposed EC2 instance contains sensitive data
        Close
      • Security Policy Title
        Ensure Application Gateway uses WAF
        Ensure Azure API Management APIs uses HTTPS rather than HTTP
        Ensure Azure SQL servers are encrypted with customer-managed keys
        Ensure Azure SQL servers are not publicly accessible
        Ensure access logs are enabled for Application Gateway
        Ensure audit logging is enabled for Azure SQL servers
        Ensure firewall logs are enabled for Application Gateway
        Ensure private endpoint is configured for Azure Key Vault Vaults
        Ensure transparent data encryption is enabled for Azure SQL databases
        Function application with a risky role combination is open to the internet
        Old Credentials for Privileged Service Principal
        Old Credentials for Service Principal
        Ensure that the Expiration Date is set for all Secrets in Non-RBAC Key Vaults
        Ensure that the Expiration Date is set for all Keys in Non-RBAC Key Vault
        Ensure that 'Enable infrastructure encryption' for each Storage Accounts in Azure Storage is set to 'Enabled'
        Ensure that the Expiration Date is set for all Keys in RBAC Key Vaults
        Ensure that the Expiration Date is set for all Secrets in RBAC Key Vaults
        Close
      • Security Policy Title
        Ensure that Cloud Storage bucket is not anonymously or publicly accessible
        Critical virtual machine instance allows login with project level SSH keys enabled
        Ensure HTTP/S Load Balancer uses HTTPS rather than HTTP
        Ensure cloud functions do not have admin privileges
        Ensure logging is enabled for HTTP/S Load Balancing backend services
        Ensure to use Cloud Armor security policies for HTTP/S Load Balancing backend services
        Identity without MFA can elevate privileges by delegating as service accounts
        Non-human identity can create keys for service accounts
        Virtual machine instance with access to stale data snapshots is exposed to the public internet
        Close

      To learn more, see About Security Policies.

    • System Notifications

      ZPC supports system notifications that provide information about any possible errors or failures related to configurations or functionality in your cloud infrastructure. Currently, ZPC displays system notifications for cloud account onboarding and data collection failures. These notifications allow you to easily track and resolve the issues immediately.

      To learn more, see About System Notifications.

    • Vulnerability Detection in Microsoft Packages

      ZPC supports the detection of vulnerabilities in some of the Microsoft packages such as .NET Framework, .NET Core Runtime, .NET Runtime, ASP .NET, Visual Studio, PowerShell, and SQL Server Management Studio.

      To learn more, see About Vulnerability Management.

April 19, 2023
  • Feature Available
    • Cloud Account Onboarding Enhancements

      The Cloud Accounts page offers visibility into onboarding and configuration metadata collection status. Administrators can view configuration metadata issues and possible solutions.

      To learn more, see About Cloud Accounts.

    • Dashboard for Container CVE Scans

      ZPC already provides support for the CVE scanning of Amazon Elastic Kubernetes Service (EKS) containers. You can now view a detailed dashboard of the container vulnerabilities that ZPC discovered in monitored EKS deployments. Use the filters to view vulnerabilities related to specific Kubernetes clusters.

      To learn more, see About the Vulnerability Dashboard.

    • Enhanced Asset Misconfiguration Detection

      EC2 instances connected to a subnet with a default subnet-ACL and a public ID were not detected as publicly exposed. This is now corrected and as a result, a higher number of publicly exposed instances may be observed.

      To learn more, see About Cloud Assets and About Alerts.

    • IaC Support for Bitbucket

      ZPC provides support for scanning IaC files in the Bitbucket repositories. You can use Zscaler IaC Scan to scan the IaC files, view the scan results in Bitbucket, and view alerts for IaC policy violations in the ZPC Admin Portal.

      To learn more, see Configuring IaC Scan for Bitbucket.

    • Improved Service Coverage

      ZPC now offers security posture for the following services for cloud service providers:

      • Service Name
        Route 53
        AWS Batch
        AWS CodeDeploy
        AWS Step Functions
        AWS SimSpace Weaver
        AWS Serverless Application Repository
        Amazon MemoryDB for Redis
        AWS CodeBuild
        Amazon Inspector
        EC2 Networking - Transit Gateways, VPC Peering and VPNs
        AWS Athena
        AWS Elastic Beanstalk
        AWS Fargate
        Datalake GEN2
        Amazon Kinesis
        AWS DocumentDB
        Close
      • Service Name
        Azure Fluid Relay
        Azure Managed Instance for Apache Cassandra
        Azure Route Server
        Azure Database Migration Service
        Azure IoT Central
        Azure Data Explorer
        Azure Health Data Services
        Azure Managed Grafana
        Azure Chaos Studio
        Container Apps
        Azure HPC Cache
        Azure Health Bot
        Azure Load Testing
        Azure Cloud Services (classic)
        Azure Batch
        Azure Quantum
        Azure Internet Analyzer
        Azure Firewall Manager
        Azure Blueprints
        Azure Analysis Services
        Datalake GEN2
        Close
      • Service Name
        ApiGateway Gateway
        App Engine
        Cloud Functions
        Cloud Tasks - Queue
        Cloud Tasks - Tasks
        Filestore - Snapshot
        Filestore - Instance
        ApiGateway API Config
        Logging LogBucket
        Cloud Tasks Queue
        Cloud TPU Node
        DataFusion Instance
        Close

      To learn more, see About Cloud Asset Types and Asset Categories.

    • Kubernetes Support Enhancement

      ZPC offers improved Kubernetes support:

      • ZPC collects configuration metadata and offers security posture for K8S IAM entities such as roles, role bindings, and service accounts allowing you visibility into the Kubernetes cluster RBAC.
      • ZPC collects configuration metadata for Kubelet configurations.
      • ZPC closes previously generated alerts for offboarded Kubernetes clusters.
      • ZPC offers insight into Kubernetes metadata collection. ZPC displays a new status called Warning when it's unable to collect configuration metadata for certain services.
      • ZPC collects configuration metadata only user-generated jobs.

      To learn more, see About Cloud Accounts.

    • New Tags Tab in Alerts Drawer

      A Tags tab is available in the Alerts drawer. The Tags tab gives quick access to the asset or identity tags that triggered the alert.

      To learn more, see Viewing the Cloud Alert Details.

    • Package Displayed by Vulnerability Severity

      The Asset Vulnerability tab is updated to display packages in ascending order of vulnerabilities, with the highest CVEs count based on severity first.

      To learn more, see About Cloud Asset Details.

    • Policy Focus Option Added in Create Ignore Filter

      When creating an Ignore filter, you can select Policy Focus under the Policies dropdown on the Filter Scope screen. The Policy Focus option selects if the Ignore filter focuses on assets, identities, or both.

      To learn more, see Adding Ignore Filters.

    • Remediation Recommendation in JetBrains IDE

      You can now view the remediation steps within the JetBrains IDE for policy violations detected in the IaC templates.

      To learn more, see Configuring IaC Scan for JetBrains IDEs.

    • Revamped Scanning Rules Workflow for Containers and Cloud Workloads

      The vulnerability scanning rules for cloud workloads and containers are consolidated under a single tile to simplify the process for creating vulnerability scan rules.

      To learn more, see Adding a Vulnerability Scanning Rule for Cloud Workloads and Adding a Vulnerability Scanning Rule for Containers.

    • Security Policies

      The following security policies are added for cloud service providers:

      • Security Policy Title
        EC2 Instance is running an image with critical vulnerabilities
        Ensure that ElastiCache cluster with Replication Group is not listening on the default port
        Ensure that encryption at rest is enabled for ElastiCache Redis cluster with Replication Group
        Ensure Amazon Redshift databases are not using the default port
        Ensure Amazon Redshift clusters are created within a VPC
        Ensure Amazon Redshift clusters 'cross-region snapshot' feature is set to 'Enabled'
        Ensure Amazon Redshift clusters are encrypted with KMS Customer Managed Keys (CMKs)
        Ensure RDS DB clusters are encrypted with KMS Customer Managed Keys (CMKs)
        Ensure RDS DB clusters are not deployed with the default port
        Ensure RDS DB instances are not deployed with the default port
        Ensure RDS DB clusters IAM database authentication is set to 'Enabled'
        AWS - Ensure RDS DB instances IAM database authentication is set to 'Enabled'
        Ensure RDS DB instances are deployed as Multi-AZ
        Ensure RDS DB clusters 'Log exports' feature is configured
        Ensure RDS DB instances 'Log exports' feature is configured
        Ensure RDS DB clusters 'copy tags to snapshots' feature is set to 'Enabled'
        Ensure RDS DB instances 'copy tags to snapshots' feature is set to 'Enabled'
        Ensure Aurora DBs clusters encryption is set to 'Enabled'
        Ensure Aurora DBs 'log exports' feature is set to 'Enabled'.
        Ensure Aurora DB clusters 'copy tags to snapshots' feature is set to 'Enabled'.
        Ensure Aurora 'deletion protection' feature is set to 'Enabled'
        Ensure SNS delivery status logging is enabled
        Ensure SNS topic server-side encryption at rest is enabled
        Ensure that SNS topic does not allow everyone to publish to the SNS topic
        Ensure that SNS topic does not allow everyone to subscribe to the SNS topic
        Ensure Classic Load Balancer's Desync mitigation mode is not set to 'Monitor'
        Ensure Application Load Balancer's Desync mitigation mode is not set to 'Monitor'.
        Ensure Application Load Balancer redirects HTTP traffic to HTTPS.
        Ensure CloudFront distribution uses at least one kind of logs
        Ensure CloudFront distribution standard logging is enabled
        Ensure CloudFront distribution realtime logging is enabled
        Internet facing EC2 instance can elevate to Admin using ec2-instance-connect
        Close
      • Security Policy Title
        Virtual machines with powerful identity
        Ensure that no custom subscription owner roles are created
        Ensure Custom Role is assigned for Administering Resource Locks
        Function App with power identity is open to the internet
        Power identity without MFA
        Internet facing virtual machine potentially exposes a vulnerable service to the internet
        Internet facing virtual machine attached with a powerful managed identity and is running an image with critical vulnerabilities
        Internet facing virtual machine attached with a managed identity is running an image with critical vulnerabilities
        Internet facing virtual machine attached with a powerful managed identity is running a vulnerable image
        Internet facing virtual machine attached with a managed identity is running a vulnerable image
        Virtual machine Instance is running an image with critical vulnerabilities
        Virtual Machine with privileged role assignment is open to the internet
        Function App with privileged role assignment is open to the internet
        Function application with a risky role combination is open to the internet
        Service principal with credentials can access unattached disk from the internet
        Virtual machine with a risky role combination is open to the internet
        Close
      • Security Policy Title
        New External Keys for privileged service account that already has external keys
        Non-human identity can create keys for service accounts
        Close
      • Security Policy Title
        Apply Security Context to Your Pods and Containers associated with Deployments
        Close

      To learn more, see About Security Policies.

    • Updated Filters for Alerts

      The following cloud and IaC alert filters are available:

      • Policy Name
      • Policy ID
      • Theme
      • Threat Category
      • MITRE ATT&CK
      • Cloud Account ID
      • Cloud Account Name
      • Focus

      To learn more, see Using Filters.

    • Vulnerability Scanning Support for Amazon Linux Versions

      ZPC provides vulnerability scanning support for Amazon Linux 2022 and Amazon Linux 2023 versions.

      To learn more, see Supported OS and Application Packages for Vulnerability Scanning.

March 23, 2023
  • Feature Available
    • Enhanced Search Functionality

      The search option across all tables and pages in the ZPC Admin Portal is enhanced for improved usability.

      You can see the following improvements:

      • The list of columns that can be searched for.
      • The column headings in tables are highlighted for better visualization.
      • The search functionality detects all items containing the search strings and displays the results in the table.

      For example, the following image shows the searchable columns on the Business Units Management page.

    • IaC Support for JetBrains IDEs

      You can install the Zscaler IaC Scan plugin on the JetBrains Integrated Development Environments (IDEs) and scan IaC templates. You can scan individual files and directories for misconfigurations.

      To learn more, see Configuring IaC Scan for JetBrains IDEs.

    • Improved Date and Time Formats

      The date and time formats are now adjusted and displayed using the format that the user has selected for their browser or operating system (OS). For example, the following image shows the date and time format on the Audit Logs page.

    • Kubernetes Support Enhancement

      ZPC now supports Microsoft Azure Kubernetes Service (AKS) clusters. You can onboard Microsoft Azure AKS clusters and gain insight into their security posture via the asset inventory.

      To learn more, see Onboarding an Azure Kubernetes Service Cluster.

    • New Alert Age Filter

      An Alert Age filter was added to the alert filter capabilities for more granularity and flexibility. The Alert Age allows you to filter based on the Alert Age attribute. By selecting Alert Age from the additional Alert Filter options, you can filter alerts by exact age, alerts older than a specific age, and alerts newer than a specific age. All ages are measured in days.

      To learn more, see Using Filters.

    • New Alert Attributes

      Four new alert attributes are added to the Cloud Alerts table: Cluster Name, Cluster Type, Namespaces, and Associated Cloud. Users can see these in the main Alerts table and the Alert Details Drawer.

      You can also search for these alerts using the Alerts Filters.

      To learn more, see About Alerts.

    • Security Policies

      The following security policies are available for cloud service providers:

      • Security Policy Title
        Internet-facing Lambda function can manage users and permissions
        Internet-facing Lambda function without WAF protection
        Instance accepts inbound internet traffic
        Role can be assumed by anyone
        Ensure that SNS topic does not allow everyone to subscribe to the SNS topic
        Ensure ElastiCache cluster is not listening on the default port
        Ensure Amazon Redshift clusters are not publicly accessible
        Internet facing EC2 instance with role is running vulnerable image
        Internet facing EC2 instance with role is running a vulnerable image and enables IMDVs1
        Internet facing EC2 instance with a powerful role is running a vulnerable image and enables IMDVs1
        Internet facing EC2 instance with a role is running an image with critical vulnerabilities and enables IMDVs1
        Internet facing EC2 instance has a powerful role and is running an image with critical vulnerabilities and enables IMDVs1
        Block-public-access control not enforced on private bucket
        Internet-facing Lambda function with admin privileges requires no authentication
        Internet facing Lambda function with privilege escalation risk with ec2 connect
        Internet-facing Lambda function with privilege escalation risk using PassRole action
        Internet facing EC2 instance can elevate to Admin using ec2-instance-connect
        Lambda Function With Anonymous URL Access is privileged
        EC2 Instance is running a vulnerable image
        Internet facing EC2 instance potentially exposes a vulnerable service to the internet
        Ensure ElastiCache cluster encryption in transit is enabled
        Ensure ElastiCache Redis cluster encryption at rest is enabled
        Ensure that encryption in transit is enabled for Redis ElastiCache cluster with Replication Group
        Ensure Amazon Redshift clusters enable encryption in transit
        Ensure Amazon Redshift clusters 'enhanced vpc routing' feature is set to 'Enabled'
        Ensure Amazon Redshift clusters 'automated snapshot' feature is set to 'Enabled'
        Ensure DynamoDB tables stream is set to 'Enabled'
        Ensure DynamoDB tables are encrypted with KMS Customer Managed Keys
        Close
      • Security Policy Title
        Ensure RBAC is configured for data plane access control in Azure Key Vault vaults
        Ensure private endpoint is configured for Azure Key Vault vaults
        Ensure public access is disabled for Azure Key Vault vaults
        Function app with power identity is open to the internet
        Ensure Purge Protection is enabled for Azure Key Vault vaults
        Power identity without MFA
        Instance is open to all ports and all IP ranges
        Virtual Machine accepts inbound internet traffic
        Ensure that the Expiration Date is set for all Secrets in Non-RBAC Key Vaults
        Ensure the storage account containing the container with activity logs is encrypted with BYOK
        Ensure RBAC is configured for data plane access control in Azure Key Vault vaults
        Close
      • Security Policy Title
        Ensure that Separation of duties is enforced while assigning service account related roles to users
        Ensure that IAM users are not assigned the Service Account User or Service Account Token Creator roles at project level
        Ensure that Service Account has no Admin privileges
        Ensure that Separation of duties is enforced while assigning KMS related roles to users
        Close
      • Security Policy Title
        Ensure Kubernetes Secrets are encrypted using Customer Master Keys (CMKs) managed in AWS KMS
        Restrict Access to the Control Plane Endpoint
        Enable audit logs
        Close

      To learn more, see About Security Policies.

    • Vulnerability Scanning of Containers in Amazon EKS Clusters

      ZPC supports the scanning of containers deployed to Amazon Elastic Kubernetes Service (EKS) clusters. ZPC identifies all active images used by containers in monitored Kubernetes clusters and scans the images present in elastic container registries (ECR) for vulnerabilities. You can view and download reports, run investigation queries, and set custom policies based on the common vulnerabilities and exposure (CVE) findings.

      To learn more, see About Vulnerability Management.

      Vulnerability Scanning Rule for Containers

      You can configure vulnerability scanning rules and schedule the scan to run at regular intervals to detect vulnerabilities in container images within the production environment.

      To learn more, see Adding a Vulnerability Scanning Rule for Containers.

March 01, 2023
  • Feature Available
    • Alert Age Attribute

      A new Alert Age attribute was added to the alert data. The Alert Age is the number of days since the last time the Alert Status was set to Open.

      To learn more, see About Alerts.

    • Cloud Account Management

      ZPC now supports changing business units for multiple cloud accounts.

      To learn more, see Managing Cloud Accounts.

    • Generate Excel Report for Asset Package Inventory

      You can export asset package data to an Excel file from the Vulnerabilties tab of the Asset drawer.

      To learn more, see About Cloud Asset Details.

    • Identity Classification Algorithm Enhancement

      The ZPC proprietary ML algorithm can now determine cloud identity types as human or non-human with more precision.

      To learn more, see About Identity Types.

    • New Time Filters for Alerts

      The alert time range filter capabilities are modified and expanded for more granularity and flexibility:

      • Cloud alerts have two time range filters: Created Date and Updated Date.

      • IaC alerts have three time range filters: Scan Time, Created Date, and Update Date.

      The Created Date is the first time the misconfiguration is identified on the customer's public cloud. The Update Date is either the most recent occurrence of the misconfiguration or the latest action performed by the ZPC admin on this alert. The Scan Date is the last time the alert was set to open.

      The change allows for filtering on the entire alert lifecycle (in which alerts can close and reopen).

      To learn more, see Using Filters.

    • Policy Catalog Enhancement

      You can now enable or disable a security policy from the policy catalog table. When disabled, the policy is not run against the collected configuration metadata.

      To learn more, see About Security Policies.

    • Query Predicate Enhancement

      ZPC now supports the following query predicates to be entered via text along with selecting from the available drop-down menu:

      • Asset Name
      • Asset ID
      • Asset Type
      • Identity Name
      • Identity ID
      • Permission Set Name
      • Allowed Action
      • Permission Set Type
      • Group Membership
      • Account ID
      • CVE ID
      • Package Name
      • Image ID

      To learn more, see Creating a New Investigation.

    • Regex Patterns for Including or Excluding File Paths in IaC Scan

      Zscaler IaC Scan supports limited scanning of specific directories within a version control system. You can use regular expression (regex) patterns to specify the file paths that must be included or excluded in IaC scans. The option to include the file path is available under Advanced Settings for GitHub, GitLab, and Azure Repos.

      To learn more, see Configuring IaC Scan for GitHub, Configuring IaC Scan for GitLab, and Configuring IaC Scan for Azure Repos.

    • Security Policies

      Added the following security policies for cloud service providers:

      • Security Policy Title
        Ensure That Microsoft Defender for App Services Is Set To 'On'
        Ensure That Microsoft Defender for Azure SQL Databases Is Set To 'On'
        Ensure That Microsoft Defender for Containers Is Set To 'On'
        Ensure That Microsoft Defender for Key Vault Is Set To 'On'
        Ensure That Microsoft Defender for Servers Is Set to 'On'
        Ensure That Microsoft Defender for SQL Servers on Machines Is Set To 'On'
        Ensure That Microsoft Defender for Storage Is Set To 'On'
        Ensure that Microsoft Defender for Cloud Apps (MCAS) Integration with Microsoft Defender for Cloud is Selected
        Ensure that Microsoft Defender for Endpoint (WDATP) integration with Microsoft Defender for Cloud is selected
        Ensure That Auto provisioning of 'Log Analytics agent for Azure VMs' is Set to 'On'
        Ensure 'Additional email addresses' is Configured with a Security Contact Email
        Ensure That 'Notify about alerts with the following severity' is Set to 'High'
        Ensure That 'All users with the following roles' is set to 'Owner'
        Close

      To learn more, see About Security Policies.

    • Software Package Inventory for Cloud Workloads and Container Images

      Customers can run queries on software packages and on threats associated with packages across workloads and container images to help with compliance.

      To learn more, see About Cloud Asset Details.

    • Supported Asset Types

      The following asset types are now supported by ZPC:

        • AWS Key Management Service (KMS)
        • Elastic Load Balancing (ELB)
        Close
        • Azure Bastion
        • Blob Storage
        • App Service
        • Azure Policy
        • Azure Cosmos DB
        • Key Vault
        • LoggingAndMonitoring
        • API Management
        Close
        • SQL Server on Google Cloud
        • Cloud Spanner
        • Firestore
        • Resource Manager
        • Cloud Logging
        • Cloud Storage
        • Cloud Functions
        • Cloud Bigtable
        • Cloud Load Balancing
        • Cloud Source Repositories
        • Cloud Composer
        Close
        • Service
        Close

      To learn more, see Cloud Asset Types and Asset Categories.

    • Vulnerability Scanning Support for Google Cloud Platform Workloads

      ZPC supports the agentless vulnerability scanning of both Linux and Windows Google Cloud Platform (GCP) workloads. ZPC supports the vulnerability scanning of both non-encrypted and encrypted (Google-managed encryption) workloads.

      To learn more, see Configuring Vulnerability Scanning for GCP Workloads.

January 19, 2023
  • Feature Available
    • Asset Risk Level

      The Asset Risk Level shows an asset's risk level based on the number and type of open alerts associated with the asset. The Asset Risk Level is Low, Medium, High, or Critical.

      The Asset Risk Level is shown in a column on the Assets page, and users can use the score to filter assets.

      To learn more, see About the Cloud Assets Dashboard.

    • Audit Logs

      Audit logs now integrate with additional ZPC modules (vulnerability management and KSPM onboarding) and show information on actions performed in the specific modules.

      To learn more, see About Audit Logs and Audit Log Events.

    • Cloud Account Onboarding Enhancements

      The following improved usability and expanded functionality are implemented to the cloud account onboarding experience:

      • ZPC now monitors every account, organization, and Kubernetes cluster's state. You can view the status on the Cloud Accounts page.
      • ZPC offers clear recommendations for configuration errors and permission handling.
      • ZPC offers enabling vulnerability settings, KSPM settings, and AWS CloudTrail settings after onboarding a cloud account.

      To learn more, see About Cloud Accounts, Configuring Vulnerability Scanning for Cloud Accounts, and Configuring CloudTrail S3 Buckets for AWS Organization.

    • Error Message for Vulnerability Scan Failure

      Error messages are displayed for vulnerability scan failures. Whenever a cloud workload or container image is not scanned due to an internal or permission error, the scan status is displayed as Failed along with the relevant error message on the ZPC Admin Portal. This message enables you to investigate and resolve the issue.

      See image.

      To learn more, see About Vulnerability Scanning.

    • Ignore Filter End Date

      You can now define an end date for an Alert's Ignore filter. When the date is passed, the Ignore status is removed from the alert and the alert returns to either Open or Resolved, depending on whether ZPC still detects the misconfiguration.

      .

      To learn more, see About Alerts.

    • Ignore Rules Operationalization

      ZPC notifies you when an Ignore rule is no longer valid or operational.

      An icon indicating the ignore rule is no longer valid appears at the top-level Ignore Rule table, and the rule is automatically disabled.

      The item that invalidates the alert rule is indicated in the Ignore Rule Details view.

      To learn more, see About Alerts.

    • Include Directory Paths in IaC

      Zscaler IaC Scan now supports the scanning of specific directories within a version control repository. Organizations leveraging monorepository (monorepo) might not want to scan the entire repository, as it could generate a lot of alerts. By including only the specific directory path, you can use the IaC Scan to focus on improving the security posture of specific parts of the repository.

      To learn more, see Configuring IaC Scan for GitHub, Configuring IaC Scan for GitLab, and Configuring IaC Scan for Azure Repos.

    • Investigation Enhancements

      The following enhancements are implemented in Investigation:

      • You can now export investigation data to an Excel file and download the report.

      • You can now investigate all deployed packages on workloads and container images.

      To learn more, see Creating a New Investigation.

    • Kubernetes Support Enhancement

      The following enhancements are implemented in Kubernetes support:

      • ZPC now supports Google Kubernetes Engine (GKE) clusters. You can onboard GCP GKE clusters and gain insight into their security posture via the asset inventory.
      • ZPC now supports onboarding EKS and GKE clusters for multiple accounts belonging to an organization.

      To learn more, see Onboarding a Google Kubernetes Engine Cluster and Onboarding an Amazon Elastic Kubernetes Service Cluster.

    • New Alert Table Capabilities

      The Alerts table has new capabilities:

      • The left-most and right-most columns are sticky, simplifying alert navigation and actions.
      • New indicators appear to show which columns were sorted and filtered in the Alerts table.
      • An Ignore End Date filter is available that allows you to sort on the alert end date.

      • You can navigate from the individual alert drawer to the policy drawer to learn more details about the policy that triggered the alert.

      To learn more, see About Alert Rules.

    • Policy Catalog Enhancements

      The policy catalog table now displays the following additional columns:

      • Updated by: View the ZPC Administrator username who last edited the security policy.
      • Last Updated: View the timestamp of the last edit on the security policy.
      • State: View whether the security policy is enabled or disabled.
      • Focus: View whether the security policy is asset focused or identity focused.

      To learn more, see About Security Policies.

    • Secrets Detection

      IaC scanning obfuscates secrets such as access keys and database passwords which are present in the Terraform and CloudFormation templates.

      To learn more, see About IaC Integrations.

    • Security Policies

      The following security policies are added for cloud service providers:

      • Security Policy Title
        Lambda with Admin Identity
        Internet-facing Lambda function with admin privileges
        Ensure Auto Minor Version Upgrade feature is Enabled for RDS Instances
        Ensure that encryption is enabled for EFS file systems
        Ensure that public access is not given to RDS Instance
        Ensure no security groups allow ingress from ::/0 to remote server administration ports (RDP Port: 3389)
        Ensure no security groups allow ingress from ::/0 to remote server administration ports (SSH Port: 22)
        Close
      • Security Policy Title
        Ensure cloud functions do not have admin privileges
        Close

      To learn more, see About Security Policies.

    • Support for Terraform Cloud Pre-Plan

      Zscaler IaC Scan supports the scanning of Terraform Cloud templates during the pre-plan phase. This option allows you to see policy violations for specific lines of code within the template file.

      To learn more, see Configuring IaC Scan for Terraform Cloud.

    • Updated Ignore Filter Rules

      There is now greater flexibility when creating ignore filters. Ignore filters allow admins to set specific criteria for ignoring any new or updated alerts. The new options include:

      • Cloud: Admins can ignore alerts for an entire cloud service provider, such as Amazon Webs Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and Kubernetes.
      • Policy Severity: Admins can ignore alerts generated for Critical, High, Medium, and Low policy severities.
      • Individual Policies: Admins can create and ignore rules based on individual users.
      • Ignore Filter End Date: The new Ignore Filter End Date feature lets Admins add an end date to an ignore policy.

      These conditions can correlate with each other and other existing criteria.

      To learn more, see Ignore Filters.

Related Articles
Release Upgrade Summary (2023)Release Upgrade Summary (2022)