What's new?
You can now configure Block Public Access for Snapshots. To get started, set the
AWS > EC2 > Account Attributes > Block Public Access for Snapshots
policy.You can now also disable Block Public Access for AMIs. To get started, set the
AWS > EC2 > Account Attributes > Block Public Access for AMIs
policy.AWS/EC2/Admin
,AWS/EC2/Metadata
andAWS/EC2/Operator
now includes permissions for Verified Access Endpoints, Verified Access Groups and Verified Access Trust Providers.Control Types:
- AWS > EC2 > Account Attributes > Block Public Access for Snapshots
Policy Types:
- AWS > EC2 > Account Attributes > Block Public Access for Snapshots
Action Types:
- AWS > EC2 > Account Attributes > Update Block Public Access for Snapshots
Bug fixes
- In a previous version (v5.31.4), we implemented a feature to Discover Snapshots and Volumes while processing their update events respectively, if those resources were missing from Guardrails CMDB. In busy environments, this would sometimes cause unnecessary Lambda executions. We've now improved this behavior to upsert the missing resources in a lighter and faster way.