Related information
- Conformity Updates - Week Ending 27 June 2025
- Deprecated AWS Compliance Standard
- Updated Azure Custom Role permissions for Azure Key Vaults scanning
- Reports API bug fix improves filtering by report configuration ID
- Deprecated Compliance Standards Removed for Improved Report Generation
- Enhance Kubernetes Security with Private Nodes in Azure AKS
- Enable Confidential Computing for Azure Virtual Machines with New Rule
- Updated AWS Well-Architected Framework Compliance Standards and Deprecation Notice
- Restrict Guest User Invites to Admins in Azure Active Directory
- New Azure Security Rules for Machine Learning and Kubernetes Services
- Updated GCP account permissions and APIs for enhanced access control
- Enhanced Security for Open-Source Databases with Microsoft Defender for Cloud
- Enhanced AWS Cloud Account Scanning for Improved Resource Verification
- New GCP account permission added for compute.forwardingRules.list
- Restrict guest user access with new Azure rule ActiveDirectory-025
- New Azure rule restricts tenant creation to admins and assigned users
- New Azure MySQL flexible server rules for transport encryption and audit logging
- Increased Maximum TTL for POST and PATCH Checks to 99 Years
- New Rule for PostgreSQL Flexible Servers Ensures Sufficient Log File Retention Period
- Custom Policy Updates: Azure Account API Permissions Updated
- Enable Microsoft Defender for Cloud in Azure Resource Manager for enhanced security
- New Azure Rules for PostgreSQL and Virtual Machine Disk Security
- Azure Database for PostgreSQL now enforces Transport Encryption for enhanced security
- New AWS IAM Rule Identifies Users with Compromised Credentials
- RTM now supports enhanced GCP rules for secure and efficient GKE clusters
- Deprecation of Outdated Compliance Standards on 26 May 2025
- RTM now supports enhanced GKE security and configuration rules
- Deprecated Compliance Standards in Conformity Reports Starting 19 May 2025
- RTM introduces GKE security rules for enhanced cluster protection
- New GKE Rules for Enhanced Security and Control in Google Kubernetes Engine
- New GCP account permission `container.clusters.get` added for enhanced access control
- New GKE Rule: Use Sandbox with gVisor for Enhanced Container Security
- New GCP Rules for Google Kubernetes Engine Cluster Monitoring and VPC-Native Traffic Routing
- AWS Lambda IAM Role Rule Severity Updated for Better Flexibility
- Limit on Organisation-Level Communication Settings Implemented for Stability
- New GCP Rules for GKE Clusters: Legacy Authorization Disabled, Private Nodes Enabled
- Enhance GKE Security with Metadata Server Enabled in GCP
- Enable Workload Vulnerability Scanning in GKE clusters for enhanced security
- Template Scanner now supports Terraform HCL templates for easier scanning
- Enable Intranode Visibility in GKE Clusters with New Rule GKE-018
- Enable Binary Authorization for GKE clusters with new GCP rule
- Enable and Configure Cluster Logging for GKE with New GCP Rule
- Discontinuation of Cloud One Template Scanner (Preview) on GitHub
- Custom Check Public API Rule Title Update and Immutability Enforcement
- New GCP Rule: Prevent Alpha GKE Clusters for Production Workloads
- Template Scanner now supports direct scanning of Terraform HCL templates from `.zip` files
- Restrict Network Access for GKE with New Rule GKE-013
- Integrity Monitoring enabled for Google Kubernetes Engine cluster nodes
- Enable Auto-Repair for GKE Cluster Nodes with New GCP Rule
- Expanded Template Scanner now supports additional AWS resources
- Automate GKE Cluster Version Upgrades with Release Channels
- Enable Secure Boot for Cluster Nodes in GKE with New GCP Rule
- Shielded GKE Cluster Nodes rule added for enhanced security in Conformity
- Updated Conformity AWS Custom Policy and New Rule for Inspector2-002 Integration
- Enable Auto-Upgrade for GKE Cluster Nodes in GCP with New Rule GKE-006
- AWS CloudFront now enforces Origin Access Control for S3 origins
- New AWS Lambda rule enforces least privilege by restricting role sharing
- Updated AWS, Azure, and GCP Rules for Enhanced Cloud Security
- Fixed Template Scanner API errors for parameter arguments and awsNotificationArns pseudoArguments
- New GCP Rule Ensures Functions Use Latest Runtime Version
- AWS GuardDuty now monitors S3 Protection feature for enhanced security detection
- Enable Malware Protection for EC2 in Amazon GuardDuty detectors
- Compliance Reports and Standards Filtering for AWS, Azure, and GCP Cloud Environments
- Updated HITRUST CSF v11.3.0 Compliance Standards and Reports
- Updated CloudVPC-006 rule logic for correct DNS Logging configuration validation
- Cloudformation Template Scanner Excludes ELBv2-004 and ELBv2-008 Rules
- Upgrade Google Cloud Platform RTM Configuration to Node.js 16 by 30 January 2025
- AWS Lambda Runtime Environment Versions Updated to Latest for Conformity Feature
- Updates to AWS RDS Encryption Rule: New notifications for failed checks
- Improved Endpoint Address Inference for RDS DB Clusters and Instances
- Updated rule logic for CloudVPC-006 to validate DNS Logging configuration
- Updated GCP Account Permissions with New 'artifactregistry.dockerimages.list' Permission
- Enhanced Rule Mapping for CIS AWS Foundations Benchmark Compliance
- AWS ElastiCache Engine Updated with Valkey Support and Latest Redis/Memcached Versions
- Deprecated CIS Microsoft Azure Foundations Benchmark v1.5.0 for Compliance Reports
- AWS ElastiCache Engine Update to Latest Version Available for EC-013 Compliance
- New AWS Lambda runtime versions Python 3.14 and Nodejs.22 added
- Updated Compliance Standards to Meet CIS Foundations Benchmarks for AWS
- Conformity AWS Custom Policy Updated with New Permissions
- Enhanced Standards Reports with Cloud Provider Tags Limit
- Enhanced Standards and Compliance Reporting with 5 Cloud Provider Tags per Check
- Conformity Introduces AWS Custom Policy Update with New Permissions
- AWS Lambda Runtime Update to Exclude Python 3.8 Support
- AWS Lambda Update: Python 3.8 Support Removed
- AWS Custom Policy Update: New Permission Added for bedrock:ListFoundationModels
- Updated Service Now Connector to Xanadu Version Available in Service Now Store
- Amazon SageMaker now supports VPC-only mode for notebook instances
- Azure Vulnerability Assessment Rule Updates for SQL Servers
- Update to Azure AIServices-001 Rule for Improved Check Generation
- New Rule Enforces Avoidance of Default VPC Network for Workbench Instances
- Prevent External IP Assignments in VertexAI Notebooks
- Enhanced Rule Mapping with New Encryption Requirements for Azure Compliance Standards
- Enable Cloud Monitoring for Vertex AI Workbench Instances
- Enable Idle Shutdown for Vertex AI Workbench Instances Available with New Rule
- Enable Virtual Trusted Platform Module (vTPM) for Vertex AI Workbench Instances
- VertexAI-006: Encrypt Workbench Instances with Customer-Managed Keys
- New Managed Identity Options for Azure API Management Services
- Automatic Upgrades for Vertex AI Workbench Instances Enabled in Conformity
- Upgrade Conformity GCP RTM Configuration for Node.js 16 Decommissioning
- Configure Sensitive Information Filters for Amazon Bedrock Guardrails in Conformity
- Enable Integrity Monitoring for Vertex AI Workbench Instances
- Enable Secure Boot for Vertex AI Workbench Instances
- Azure now defaults to Express configuration for vulnerability assessment emails
- Updated GCP Permissions and New Rule for Vertex AI Workbench Instances
- AWS Conformity updates rule for OpenSearch Version to 2.13
- Google Cloud Vertex AI offers encryption with Customer-Managed Encryption Keys
- Rule Update for AWS VPC Endpoint Cross Account Access Check Generation
- New GCP account permission added: notebooks.instances.getIamPolicy
- Conformity now allows customization of Idle days for AWS EBS volumes
- Azure OpenAI Service Instances now required to use Managed Identities
- AWS Custom Policy Updated with New Permissions
- Diagnostic Logs Enabled for Azure OpenAI Service Instances
- Updated AWS Custom Policy with New Permissions Available
- Enable Managed Virtual Network Isolation with Internet Outbound Access in Azure Machine Learning
- Enhanced Security with Public Network Access Disabled for Azure OpenAI Instances
- Updated Compliance Reports with CIS Azure Benchmarks v2.1.0 Available Now
- Enhanced Security with Customer-Managed Keys in Amazon Bedrock
- New "logging.logEntries.list" permission added to GCP account permission list
- New Azure Rules for Enhanced Data Security and Compliance
- Enable Defender for APIs in Azure API Management Services
- Amazon Bedrock guardrails now protect agent sessions
- Use Customer-Managed Keys to Encrypt Amazon Bedrock Guardrails in AWS
- Updated Azure AppService rule to validate incoming client certificates correctly
- Updated Rule Mapping in CIS Azure Benchmarks for Immutable Blob Storage
- Updated encryption validation for GKE clusters' application-layer secrets
- Azure Machine Learning Workspaces now require High Business Impact for sensitive data
- Updated Replay API endpoint now supports replaying checks for account with org-level setting
- Template Scanner now supports new Terraform resources for AWS configurations
- Improved handling of API timeouts for Azure Sql-007 Threat Detection Types
- AWS Custom Policy Updated to Version 1.53 with Permissions Removal
- New GCP Rule for PostgreSQL Database Instances: Configure "log_statement" Flag for Compliance
- New GCP permissions added for account permission list
- Enhanced Webhook Communication with Static IP Allow-listing
- Template Scanner now supports additional AWS S3 Terraform resources
- Updated validation logic for RDS Publicly Accessible security groups
- Updated GCP account permissions feature new apigee.proxyrevisions.get permission
- Template Scanner now supports scanning provider-level tags in Terraform AWS provider block
- Conformity Terraform Template Scanner now available with Cloud Formation resources
- Enable MFA for Azure VM privileged identities for enhanced security
- New Azure API Management rule enforces secure TLS version configuration for API gateways
- Bug Fix for SSM Managed Instances Check in AWS Conformity
- Fixed issue with Terraform Template Scanner for scanning plans with only modules
- Conformity RTM Update: Google Cloud Platform Runtime Changes for Node.js 16
- Improved CSV and PDF report generation with fixed user filter display issues
- Upcoming AWS Lambda Rule Update: Removal of 'nodejs16.x' Runtime Version
- Updated AWS account permissions now include wafv2:GetWebACL
- Filter Checks and Download Compliance Reports for AWS, Azure, and GCP environments
- Template Scanner now accurately detects Cluster Deletion Protection settings in CloudFormation
- CloudSQL now supports SSL/TLS for incoming connections
- Deprecation of Azure Well-Architected Framework in Compliance Reports
- Enable Trusted Launch for Azure Virtual Machines with New Rule Azure VirtualMachines-040
- Removed unused permission 'apigee.proxyrevisions.list' from GCP account permission list
- Updated Azure Rule: Microsoft Defender Standard Pricing Tier now excludes deprecated KubernetesService
- Enforce HTTPS for Azure API Management APIs
- Conformity now available in AWS ca-west-1 and il-central-1 regions
- AWS Custom Policy Update: New `lambda:GetFunction` Permission Added
- Enable Integration with Application Insights for API Gateway APIs
- Updated GCP account permissions now include spanner and memcache instance access
- AWS Lambda runtime changes affecting conformity scores
- New Apigee API & Account Permissions added for enhanced GCP project management
- New GCP account permissions for pubsub topics added
- Updated PCI DSS v4 Standards Report for AWS, Azure, and GCP compliance
- Azure API Management now supports HTTP/2 for improved performance
- Azure Custom Role Template Update: Permission Removal for Queue Read Access
- Enhanced Terraform Template Scanner with ELBv2 Support and Lambda VPC Access Fix
- Conformity GCP account permissions updated with new AlloyDB access
- Azure API Management now enforces resource logs for enhanced monitoring
- New Azure API Management Rules Enhance Security and Performance
- Updated Lambda Runtimes for Improved Performance
- Updated GCP account permissions for Conformity now include new options
- Enhanced Template Scanner now supports Auto Scaling Group, CloudFormation Stack, and SQS Queue
- New Rule Added: Scan ECR Container Images Automatically on Push
- AuditEvent Logging now enabled for Azure Key Vaults
- RTM introduces new AWS rules for EKS cluster security and logging
- Updated GCP account permission list now includes `compute.targetVpnGateways.list`
- New Supported Cache Node Types Added to Conformity Rule Settings
- New GCP Cloud Logging rules updated to accept bucket-based log-based metrics
- Real-Time Monitoring Issue Resolved for AWS Region us-east-1
- Template Scanner now supports Lambda Function, Kinesis Stream, and SNS Topic resources
- New GCP account permissions added for enhanced network and function management
- New GCP account permission `compute.vpnGateways.list` added
- Updated rule for Application Insights in Azure App Service
- Conformity enhances Azure compliance reporting with updated frameworks
- New GCP account permissions for Conformity added
- Updated DynamoDB-005 Rule for Accurate Backup and Restore Detection
- Lambda Runtime Updates and Security Group Rule Deprecation
- Rule Updates: Key Rotation and VPC Flow Logs Improvements
- Upcoming Rule Updates for AWS and GCP with Key Rotation and Runtime Environment Changes
- New GCP account permission "iam.roles.list" added for Conformity cloudiam-roles descriptor
- Updated rules exclude cross account evaluation for BigQuery encryption with customer-managed keys
- Custom Checks now support Time-To-Live updates for better customization
- Conformity Enhancements: New Custom Checks TTL Management and Rule Update for Client Certificates
- Conformity introduces updated AWS custom policy with new permissions
- Support for Google Cloud Architecture Framework compliance in GCP
- Support for AWS RDS Transport Encryption for MySQL and Aurora Databases
- Improved AWS API call monitoring with bug fix for regex validation
- Enable Amazon Inspector 2 for enhanced AWS cloud environment security
- Bug Fix improves Activity Log Storage Container checks in Monitor-005
- New AWS Lambda function rule and S3 bucket encryption exceptions added
- Conformity Enhancements for NIS Europe Compliance Standards and Rule Updates
- Updated Conformity Custom Policy with Added Permissions
- Bug Fix for CloudLogging Rules and Update to CloudIAM-001 Rule Configuration
- Improved accuracy in scanning Terraform Templates for invalid format in Template Scanner
- Updated terminology to 'Microsoft Entra ID' in Conformity and UI for clarity
- Fixed IAM certificate bug impacting multiple SSL/TLS certificate rules and updated CloudLogging-001 rule
- Expanded Tag Support for Additional AWS Resource Types
- Template Scanner in Conformity now continues scanning Terraform plans without interruption
- Updated Azure Cosmos DB rule to improve network access restriction validation
- GuardDuty Enabled Rule now supports all AWS regions
- Updated Compliance Standards: CIS Foundations Benchmarks for AWS, Azure, and GCP
- Conformity Enhancements for SOC 2 Compliance and Security Group Mapping Updates
- Updated rule now supports Windows and unsupported Linux VMs for Azure Virtual Machines
- New `dateComparison` operator added for Custom Rules
- Updated Conformity rules for optimal interaction with restricted AWS regions
- Updated Compliance Standards Mapping for Rules in Conformity
- Rule mappings now compliant with ISO 27001:2022 and AWS Well-Architected Framework
- Enable Instance Storage AutoScaling and Template Scanner Bug Fix
- New AWS Rule Update Allows Disabling Specific Regions for Conformity Checks
- New AWS Lambda rule to ensure supported runtime environments usage
- Enable Transparent Data Encryption for Azure Synapse Analytics Dedicated SQL Pools
- Azure SQL Managed Instances now support encryption with Customer-Managed Keys
- Rule Update for GCP Compute Engine-001: Improved identification of VM instance network interface access configuration
- Integrate Conformity with Trend Vision One for enhanced risk insights
- Updated rule in Azure SecurityCenter for enabling Microsoft Defender Standard Pricing Tier
- AI Assistants now support 85 languages for enhanced user experience
- Rule Update for ComputeEngine-003: Improved identification of Interactive Serial Console Support status
- AI Assistant now available for Knowledge Base and Help pages
- Efficient Scanning for Cloud Accounts with Large Resources Added
- New Rule for Examining and Resolving Microsoft Defender for Cloud Security Alerts in Azure
- Conformity Report renamed to Cloud Posture Report; Lambda Runtime Environment Version Rule Update
- GCP Conformity Bot no longer scans shutdown projects
- Improved scanning for GCP Resource Manager service to reduce API throttling
- Custom Rule Updates for Enhanced Customization Experience
- Updated rule logic for EBS encryption with KMS Customer Master Keys
- New PostgreSQL configuration rule for CloudSQL instances
- New rule to manage API keys for active services in Google Cloud projects
- New GCP Rule for Configuring "log_min_messages" Flag on PostgreSQL Instances
- Rule CloudSQL-001 Updated to Align with CIS GCP v2.0 Control 6
- Standalone Conformity SSO Certificate Expiry Reminder
- Updated rule for identifying KMS keys in S3 buckets with customer-provided CMKs
- Updated CFM-006 rule now generates failure check for overly permissive IAM role policies
- Custom Compliance Standards now accessible via Conformity API endpoints
- Enhanced Azure Network Watcher rule with region customization and failure notification
- New Azure encryption rule & compliance updates for NIST, APRA, and CIS Controls
- Enhanced AWS CloudFront scanning for improved security checks
- New Azure Rules Enhance Security and Compliance Measures
- Updated CloudFront Security Policy for CF-006 Rule Compliance
- Bug Fix: AWS Conformity Bot now supports disabled AWS Gov Cloud regions
- Historical Reports Download Bug Fixed, Restoration Efforts Made
- New Azure rule enforces no custom subscription administrator roles
- Azure StorageAccounts-023 Rule: Private Endpoint Enforcement for Microsoft Azure Storage Accounts
- Updated Security Policy Rules with Configurability and Latest TLS Versions
- Conformity UI transitions to Dark Mode for improved consistency and branding
- Conformity Bot bug fix ensures STS enabled in all AWS regions
- Bug Fix: Active users without email no longer appear in recipient list
- Conformity User Interface transitioning to Dark Mode on 12 July 2023
- Bug Fix for Weekly Summary Emails in `us-west-2` Region
- Conformity Bot now accurately scans RDS Snapshots
- Bug Fix for S3 Bucket DNS Compliance Check Accuracy
- Configure load balancers for Managed Instance Groups in GCP
- New GCP rule requires defining index page suffix and error page for bucket websites
- Bug Fix for Template Scanner for CMK Encrypted RDS
- Efficient Cloud Account Scanning for Conformity Bot Introduced
- Bug Fix: Increased Conformity consumption billing for certain resources
- Updated rule logic to restrict default network access for Azure Cosmos DB Accounts
- Conformity Billing Incident Leads to Reduced Usage Charges for Customers
- New GCP rule ensures SSL certificates are renewed within validity period
- New Feature: Disable Specific Regions in Rule Configuration Settings
- HIPAA compliance standard updated to latest version and added support for GCP rules
- Bug fix for S3 Object Lock template scanner returning incorrect checks
- Bug fix for accurate AWS IAM rule checks for Credentials Last Used
- Enhanced AWS Resource and Rule Support in Template Scanner Github App
- ServiceNow Integration now allows setup without delete permissions
- Rule EC2-033 now supports allowlist for unconfigurable Security Groups
- Bug Fix: Improved Accuracy in AWS IAM Access Key Rotation Checks
- Fixed bug enabling/disabling AWS GovCloud in Conformity Bot settings
- Updated Rule to Monitor Public Access to Azure Diagnostic Logs
- Improved Template Scanner now remediates resources for specific naming conventions and tags
- New API Endpoint for Deleting Custom Roles in Access Control
- Updated SecurityCenter rule for Microsoft Defender for Cloud recommendations
- Bug fixes for accurate GCP Cloud Logging rule checks added
- Enhanced Access Control API validation for Cloud One Admin users
- Real-Time Threat Monitoring now available for Google Cloud Platform (GCP)
- Enhanced Azure Advisor Recommendations Integration for Improved Functionality
- Improved CSV Report Tag Handling with New TagObjects Column
- New API Endpoints for Custom Access Control Roles Introduced
- RBAC Enabled for Kubernetes Cluster with Fixed Bug AKS-001
- Updated rule logic for Storage Account access permissions
- Bug Fix for Exception Support in Rules RDS-023 and RDS-040
- Fixed bug causing users to be logged out of Conformity console while working
- Conformity deprecates multiple AWS and Azure rules for enhanced compliance
- Bug Fix for Template Scanner bypassing Account settings for KMS Cross Account Access
- Bug fix for Conformity Template Scanner handling default behaviors of parameter
- New AWS Lambda Rule: Function URL Security Check and Resource ID Exceptions
- Enhanced Compliance Standards and New Rule for AWS Lambda Authentication
- Conformity introduces Custom Policy Update with new permission for AWS users
- Improved Logo Upload and Organisation Details Management for Cloud One Users
- Updated AWS IAM Scanning Requires `iam:GetAccountAuthorizationDetails` Permission
- Fixed false positive checks for enabling system-assigned managed identities
- Changes to AWS IAM Scanning Require Updated Permissions and Custom Policy
- Bug Fix: Improved Template Scanner Results for S3 Bucket Keys Compliance Checks
- Improved EBS resource scanning and resolved logout bug in Cloud One
- Enhanced SQS-004 Rule Logic for Latest AWS Encryption Options
- Bug fix enables onboarding new Azure subscriptions via public APIs
- Administration User screen removed for Cloud One Users in Conformity Feature
- Updated resource links for Azure Console access in SecurityCenter rules
- Conformity Template Scanner now supports additional AWS regions for CloudFormation templates
- Bug Fix: Event Rule now successfully creates CloudWatch Alarm without errors
- Conformity now excludes TTL checks from compliance score calculation for accuracy
- Improved accuracy and elimination of duplicate checks in CloudTrail S3 Bucket Logging
- Improved accuracy and account restriction in CloudTrail Bucket MFA Delete rule
- Improved AWS Kinesis resource scanning for enhanced performance
- Improved AWS Config rule for referencing missing S3 bucket enhances scanning and reduces false positives
- Severity Update for RTM Configuration Change Rules to Improve Alert Fatigue
- Conformity Bot enhanced to scan large numbers of SNS resources efficiently
- Enhanced Resource Details and Links in Tags Rule
- Updated Compliance Standards and ISO 27001:2022 Support for Cloud Environments
- AWS Real-Time Monitoring now supports EventBridge Cross-Account IAM Role for enhanced security
- Conformity Introduces New Azure and GCP Rules, Expanded GCP Region Support, and
- Bug Fixes and Custom Policy Status Update in Conformity's Latest Release
- Enhanced AWS Security Rules and Custom Policies in Conformity's Latest Update
- New Azure rule, bug fixes, and rule updates in Conformity's latest release
- Conformity Enhancements for AWS EventBridge Cross-Account IAM Role Changes
- Conformity introduces Chinese character support, extended GCP regions, and bug fixes
- Enhanced Security and Resilience for Conformity Platform with Elasticsearch Upgrade
- Conformity Enhancements for AWS and Azure Compliance Standards
- Improved Cloud Account Onboarding and Bug Fix in Conformity's Latest Release
- Limit introduced to prevent SNS service throttling for scanning AWS topics
- Conformity Enhancements: Bug Fixes and Azure Storage Account Limit Update
- Conformity discontinues pre-release notices for faster rule deployment
- View Summary of Disabled Cloud Accounts on Main Dashboard with Latest Conformity Update
- Conformity introduces new compliance features, bug fixes, and expanded rule support
- Conformity Enhancements: New Features, Bug Fixes, and GCP Rules Introduced
- AWS Outage in Oregon Region Impacting Conformity Application Access and Workflows
- Conformity introduces new GCP and Azure rules, Compliance Standards updates, and bug fixes
- GCP General Availability with Marketplace Consumption Pricing for Cloud One Conformity Customers
- Conformity Enhancements: New Compliance Standards, Bug Fixes, and Azure Rule Updates
- Conformity Enhancements: Expanded GCP Project Onboarding, Updated Compliance Standards, and New Rules
- Conformity introduces new Azure network security rules and bug fixes
- Cost Optimization Feature Deprecated to Focus on Cloud Security Posture Management
- Conformity Enhancements: Enforce API Key Safe IP Ranges and New Rule Updates
- Conformity Full Access Users Can Create Custom Roles with Varied Permissions
- Enhanced Compliance Monitoring and New Rules Added for Conformity Platform
- Conformity Enhancements: New Standards, Bug Fixes, Rules, and Policy Updates
- Updated Compliance Dashboard and New GCP and Azure Rules Available
- Conformity Introduces New Rules and Updates for AWS, Azure, and GCP Integration
- False positive checks for Azure rule AppService-018 resolved
- Conformity Introduces Sustainability Pillar Support and New Rules for Azure, AWS, and G
- Conformity introduces updated compliance reports, new rules, and bug fixes
- Conformity Enhancements: Updated Compliance Metrics, Special Characters Support, New GCP Rules
- New Google Cloud Platform rules and bug fixes enhance Conformity's security and compliance capabilities
- Conformity resolves AWS data retrieval errors impacting IAM and TrustedAdvisor checks
- Conformity now supports CIS Benchmarks for AWS Foundations 1.4 Standard and Framework
- New GCP and Azure rules, bug fixes, and custom policy update in Conformity
- Conformity now supports LGPD Compliance, adds descriptions to Configured Reports, and introduces new G
- New API Endpoints, Bug Fixes, Custom Policy, and Rules Enhancements Released on Conformity
- Conformity introduces Terraform Provider, GCP Onboarding, UX Improvements, and New Rules
- Conformity introduces new rules, bug fixes, and custom policy updates for enhanced security
- Enhanced IAM Service Checks for Conformity Bot Efficiency
- Google Cloud Platform (GCP) Preview, Compliance Reports, Customization, and New Rules Released
- Conformity enhances Terraform Template Scanner and introduces new IAM rule
- Conformity introduces new standards, bug fixes, and optimized rules for AWS users
- Conformity API Integration Enhances AWS Well-Architected Tool Workflow
- List Template Scanner Rules API endpoints added for Terraform and CloudFormation templates
- Real Time Threat Monitoring for Azure, Organization Profiles, and Enhanced Reports Added
- Conformity introduces Terraform Template scanning in preview for user feedback
- Conformity Enhancements: Improved Communication Channels, Cloud One Integration, and Bug Fixes
- Conformity enhances compliance with new Azure rules and AWS framework updates
- Check ServiceNow SecOps Module for Viewing Checks
- Conformity Release Notes for Latest Updates