Skip to main content

Export View Budget Data to CSV

Stax
Stax
Stax Team

When setting budgets that leverage your Views, you can now sort the budget table by segment name and download the budget data to CSV. Find out more here.

Stax-managed GuardDuty Notice

Stax
Stax
Stax Team

As part of Stax Assurance, Amazon GuardDuty is configured for Stax-managed AWS Organizations. In an upcoming release of Stax, advanced configuration of GuardDuty will be possible via the Stax Console and API.

There are several considerations for organizations with GuardDuty configuration in place beyond what Stax configures as part of Stax Assurance. Read Configure Amazon GuardDuty within Stax for more information. Contact your Customer Success Manager if you have any questions regarding this upcoming release.

Changes to Rule - Ensure that public access is not given to RDS Instance

Stax
Stax
Stax Team

As announced on 3 May 2023, a fix has been released to remediate an issue impacting several Rules that verify if RDS instances are publicly accessible.

Before the change, the Rules incorrectly marked RDS databases as public if the RDS instances were in a VPC subnet with a default route CIDR block of 0.0.0.0/0. This check was invalid because the default route must also be configured with an internet gateway as the target to be publicly accessible.

The Rule will now pass if the RDS instance subnet does not allow public egress via a default route (CIDR block of 0.0.0.0/0) with an internet gateway as the target. This change may have impacted the compliance score of the listed rules.

BundleRule Name
CIS Benchmark Version 1.5.0
CIS 2.3.3 - Ensure that public access is not given to RDS Instances
Organization Rules/Rule CatalogRDS instances in a subnet should not have internet access
APRA Version 1.0RDS instances should not exist in public subnets

This rule has been renamed to:
RDS instances in a subnet should not have internet access
RDS Best Practice Version 1.0RDS instances in a subnet should not have internet access

Changes to Rules object-level logging for S3 buckets

Stax
Stax
Stax Team

On 15 May 2023, a change will be released for the listed Rules that check if object-level logging is enabled for S3 buckets.

Currently, S3 buckets in Stax-managed member accounts will fail the check even when the required CloudTrail S3 data event logging is enabled, because Stax follows AWS best practices and configures CloudTrail at the Organization-level, not within every individual member account.

After the change, this Rule will detect when S3 data event logging is enabled on CloudTrail trails configured in member accounts as well as when configured on Organization-level CloudTrail trails.

Bundle NameRule Name
Organization Bundle/catalogEnsure that Object-level logging for write events is enabled for S3 bucket

Ensure that Object-level logging for read events is enabled for S3 bucket
CIS Benchmark v1.3.0, v1.4.0 & v1.5.0CIS 3.10 - Ensure that Object-level logging for write events is enabled for S3 bucket
CIS 3.11 - Ensure that Object-level logging for read events is enabled for S3 bucket

By default, Stax does not configure S3 object-level logging for Stax-managed accounts. An S3 bucket with a high workload could quickly generate thousands of logs in a short amount of time, resulting in increased AWS costs. Find out more about Enabling CloudTrail event logging for S3 buckets and objects.

Changes to GET/20190206/groups API

Stax
Stax
Stax Team

As announced on 19th April 2023, the GET /20190206/groups/{group_id} route now returns a 404 HTTP status code if the group_id provided has the status of DELETED or does not exist.

Previously, the archived record would be returned for a deleted group and "Groups": [] would be returned if the group did not exist.

Changes to GET/20190206/users API

Stax
Stax
Stax Team

As announced on 6th April 2023, the following changes were made to the GET /20190206/users API route:

  1. This route no longer returns API tokens. The GET /20190206/api-tokens route should be used instead

  2. This route no longer returns DELETED users by default. The previous behavior was to return all users regardless of their status. To get a list of deleted users, you will need to explicitly request it with the status_filter query string, e.g. /users?status_filter=DELETED

  3. The GET /20190206/users/{user_id} route now returns a 404 HTTP status code if the user_id provided has the status of DELETED. Previously, this would return the archived record

Changes to Rule - Ensure that public access is not given to RDS Instance

Stax
Stax
Stax Team

On 10 May 2023, a fix will be released for Rules that check that RDS instances are publicly accessible via a VPC.

Currently, the listed Rules include a check that incorrectly marks an RDS database as public if the RDS instance in a VPC subnet has a default route CIDR block of 0.0.0.0/0. This check is invalid because the default route must also be configured with an internet gateway as the target to be publicly accessible.

Bundle NameRule
CIS Benchmark Version 1.5.0CIS 2.3.3 - Ensure that public access is not given to RDS Instances

This Rule also checks if the Publicly Accessible flag is disabled.
Organization Rules/Rule CatalogEnsure that public access is not given to RDS Instance via VPC
This Rule also checks if the RDS Instance Public Accessible setting is disabled

RDS instances in a subnet should not have internet access
APRA Version 1.0RDS instances should not exist in public subnets
RDS Best Practice Version 1.0RDS instances in a subnet should not have internet access

After the change, these Rules will pass if the below** condition is met:**

  • The RDS instance subnet does not allow public egress via a default route (CIDR block of 0.0.0.0/0) with an internet gateway as the target.

This change may impact the compliance score of the impacted rules.

PCI DSS v3.2.1 Rule Bundle available

Stax
Stax
Stax Team

The Payment Card Industry Data Security Standard (PCI DSS) v3.2.1 Rule Bundle is now available to all organizations. This Bundle is designed to help customers maintain the security of cardholder data and protect against fraudulent activities.

The new PCI DSS Rule Bundle includes over 40 controls across 17 AWS services and 17 new rules.

Add the Bundle to Stax to get going. Once added, Stax will perform an initial evaluation and populate the Rules page with new results. You can filter the page to show only results from the PCI DSS if preferred. Read more about the Stax PCI DSS Rule Bundle here.  Alternatively, to add the new rules to your Organization Rule Bundle, head to the Rules Catalog page.

Update to Rule - S3 enforces object encryption

Stax
Stax
Stax Team

The Rule*** S3 enforces object encryptionhas been renamed to *** ***Ensure all S3 buckets employ server-side encryption-at-rest, ***in the S3 Best Practices and Organization bundles. This change helps to align the rule name across different bundles making it easier for customers to search for this rule across bundles.

It's important to note that the name of the rule has not been changed in the CIS Benchmark bundle to align with the standard's specification.