What's new?
- We've updated internal dependencies and now use the latest Azure SDK versions to discover and manage Key Vault resources in Guardrails. This release includes breaking changes in the CMDB data for key, and secret. We recommend updating your existing policy settings to refer to the updated attributes as mentioned below:
KeyVault > Vault
Added :
enableSoftDeletepublicNetworkAccessenableRbacAuthorization
KeyVault > Key
Added :
hsmPlatform
Removed:
key.ekey.n
KeyVault > Secret
Modified :
IDproperty does not contain the secret version.
Removed:
expiresupdatedcreated
Bug fixes
- The
Azure > Key Vault > Key > CMDBcontrol would go into an error state while fetching key rotation policy details for managed keys. The control will no longer attempt to fetch the key rotation policy details for such keys and will work as expected. - Improved descriptions for various resource types to ensure they are clearer and more helpful.