Skip to main content

Fix to Reserved Instance recommendations displayed in Stax

Stax
Stax
Stax Team

As announced on 04 September 2023, Stax has released a fix for an issue resulting in some out-of-date RI recommendations being collected from AWS member accounts.

Stax has released a change to only show RI recommendations that are less than 30 days old making the current recommendations and savings opportunities more accurate. Customers may notice a decrease in the **Total Potential Yearly Saving **and a reduction in the number of savings opportunities displayed.

This change does not impact RI recommendations generated by Stax within the AWS management account which are scoped to all accounts in the organization's consolidated billing family. These recommendations cover both the management account and member accounts and are refreshed daily.

AWS Lambda End of Support for the Go 1.x Runtime

Stax
Stax
Stax Team

As of December 31st, AWS will no longer provide support for the Go 1.x runtime in AWS Lambda, as announced in this AWS blog post.

This change will be deployed to all affected Stax-managed Lambda functions before December 31, 2023. No customer action is required for this change and we will inform you when this change has been applied.

For any further questions, please raise a support case.

Fix to Reserved Instance recommendations displayed in Stax

Stax
Stax
Stax Team

On 11 September 2023, Stax will be releasing a change to remediate an issue impacting Reserved Instance (RI) recommendations shown within the Reserved Instances tab on the Savings Plans & RIs page. This issue is resulting in some out-of-date RI recommendations being collected from AWS member accounts.

After the change, Stax will only show RI recommendations that are less than 30 days old making the current recommendations and savings opportunities more accurate. Customers may notice a decrease in the **Total Potential Yearly Saving **and a reduction in the number of savings opportunities displayed.

This change does not impact RI recommendations generated by Stax within the AWS management account which are scoped to all accounts in the organization's consolidated billing family. These recommendations cover both the management account and member accounts and are refreshed daily.

NIST Cybersecurity Framework Rule Bundle Available in Public Preview

Stax
Stax
Stax Team

The NIST Cybersecurity Framework Rule Bundle is now available to all organizations. This Bundle is designed to help customers fortify their AWS environment against cyber threats and strengthen their security posture.

The new bundle currently includes 86 controls and over 16 new rules, with more to be added during the preview phase.

Add the Bundle to your Stax console to get started. Once added, Stax will perform an initial evaluation and populate the Rules page with new results. You can filter the page to show only results from the NIST Cybersecurity Framework bundle if preferred. Alternatively, to add any of the new rules to your Organization Rule Bundle, head to the Rules Catalog page.

Introducing Updated Compliance Rules for AWS CloudTrail Log Metric Filters

Stax
Stax
Stax Team

As part of our ongoing maintenance and improvement of rules and rule bundles, we are updating rules related to AWS CloudTrail log metric filters. This change will offer a shift towards organization-level CloudTrail configurations, enabling enhanced security and manageability for your resources.

Please be aware that the existing rules will be deprecated in the following bundles:

  • AWS FTR version 1.0.0

  • CIS Benchmark from version 1.1.0 to 1.5.0

  • Organization Rules

  • S3 Best Practice version 1.0 and version 1.1

  • Stax Foundation Compliance version 1.0

The deprecated rules are as follows:

  • Ensure a log metric filter and alarm exist for AWS Config configuration changes,

  • Ensure a log metric filter and alarm exist for AWS Management Console authentication failures,

  • Ensure a log metric filter and alarm exist for Management Console sign-in without MFA,

  • Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL),

  • Ensure a log metric filter and alarm exist for changes to network gateways,

  • Ensure a log metric filter and alarm exist for CloudTrail configuration changes,

  • Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer-created CMKs,

  • Ensure a log metric filter and alarm exist for IAM policy changes,

  • Ensure a log metric filter and alarm exist for route table changes,

  • Ensure a log metric filter and alarm exist for S3 bucket policy changes,

  • Ensure a log metric filter and alarm exist for security group changes,

  • Ensure a log metric filter and alarm exist for unauthorized API calls,

  • Ensure a log metric filter and alarm exist for usage of root user credentials,

  • Ensure a log metric filter and alarm exist for VPC changes

The newly introduced rules will take their place with the following rule names respectively:

  • CloudTrail should have a log metric filter for AWS Config changes,

  • CloudTrail should have a log metric filter for Console authentication failures,

  • CloudTrail should have a log metric filter for Console sign-in without MFA,

  • CloudTrail should have a log metric filter for NACL changes,

  • CloudTrail should have a log metric filter for Network Gateway changes,

  • CloudTrail should have a log metric filter for CloudTrail configuration changes,

  • CloudTrail should have a log metric filter for scheduled deletion of customer-created CMKs,

  • CloudTrail should have a log metric filter for IAM policy changes,

  • CloudTrail should have a log metric filter for route table changes,

  • CloudTrail should have a log metric filter for s3 bucket policy changes,

  • CloudTrail should have a log metric filter for security group changes,

  • CloudTrail should have a log metric filter for unauthorized API calls,

  • CloudTrail should have a log metric filter for root user credentials,

  • CloudTrail should have a log metric filter for VPC changes

Please note that the check history for the deprecated rules will not be kept.

If you have any questions about this change and what it means for you, please contact support.

Changes to the Policy API Schema Implementation

Stax
Stax
Stax Team

As part of the upcoming release to Manage AWS Organizational Units and Service Control Policies in Stax the following changes will be made to the Policies API Policy method's schema implementation. For a detailed outline of these changes, see the release plan here.

  • Removed: Attachableto is no longer defined in the schema

  • Removed: Mandatory is no longer defined in the schema

  • Removed: Public is no longer defined in the schema

  • Renamed: Policy is now defined as Content in the schema

  • Changed*:* Status  values are now; ACTIVE, CREATE_FAILED, CREATE_IN_PROGRESS, DELETED, DELETE_FAILED, DELETE_IN_PROGRESS, UPDATE_IN_PROGRESS. Previous values; ACTIVE, DELETED, FAILED

  • Added: AwsId is now defined in the schema

  • Added: ExternalResource is now defined in the schema

  • Added: OrganisationAttachment is now defined in the schema

  • Added: PolicyOwner is now defined in the schema

  • Added: PolicyType is now defined in the schema

  • Added: Tags is now defined in the schema

  • Added: UserTaskId is now defined in the schema

The API documentation for the new Policies schema can be found here, with the release of this feature the Policyv2 schema will be renamed to replace Policy.

If you have questions or concerns regarding the changes, please reach out by raising a support case.

ACSC Essential Eight Rule Bundle available

Stax
Stax
Stax Team

The  Australian Cyber Security Centre Essential Eight Rule Bundle is now available to all organizations. This Bundle is designed to help customers fortify their AWS environment against cyber threats and strengthen their security posture.

The new Stax Compliance ACSC Essential Eight Rule Bundle includes 42 controls and 16 new rules.

Add the Bundle to Stax to get going. Once added, Stax will perform an initial evaluation and populate the Rules page with new results. You can filter the page to show only results from the Essential Eight bundle if preferred. Alternatively, to add any of the new rules to your Organization Rule Bundle, head to the Rules Catalog page.