What's new?
- Server
- Introducing scoped Account/* permissions to help application teams manage their own accounts.
- Notifications routing based on permissions.
Bug fixes
Server
- Controls no longer crashes when there's a parsing issue in rule-based notifications. Instead, it logs the error gracefully and continues running.
- Fixed a problem where certain operations could trigger a "callback already called" error, improving overall reliability of caching.
- The
Type Installed
control now spreads events over time to reduce the likelihood of API throttling during large-scale installations or updates. - Guardrails now skips storing resource tags larger than 1 KB to ensure only valid tags are saved and to avoid potential issues later.
- The osquery worker now correctly uses the TURBOT_RDS_SSL_FILE environment variable to point to the right certificate file, fixing an issue where it previously referenced the wrong path.
- To improve reliability and performance, Guardrails prioritizes events in the order
Type Installed
>Policies
>Scheduled Actions
>Controls
. - Resolved an issue where authenticated users without the appropriate permissions were able to access process logs.
UI
- Switching between self and descendant modes no longer clears existing filter configurations — your selections will now persist as expected.
Account Permissions
Introduced a new category of permissions — Account/ — designed specifically for application teams who need limited visibility and control over resources within their own accounts. These are distinct from the Turbot/ permissions used by governance teams.
Account levels:
- Account/Owner
- Account/Admin
- Account/Operator
- Account/ReadOnly
These levels are now explained alongside Turbot/* levels, with clear usage guidance:
- Turbot/* — for managing the Guardrails platform
- Account/* — for managing resources and notifications within cloud accounts
Notification Routing to Guardrails Profiles
You can now route notifications to Guardrails user profiles dynamically based on resource permissions — a major upgrade from static email/webhook targeting. This allows for context-aware delivery to users like Account Owners or Admins.
- Supported formats:
- Specific roles like Account/Owner, Turbot/Owner
- Wildcards like Account/*
- Special role Account/CC for tagging-based routing
- Use case:
- Automatically notify account teams responsible for a resource, based on their assigned permission
Access Controls Refined for Process Logs
Access to process logs is now restricted to users with appropriate permissions, specifically those with Turbot/Metadata or higher.
Previously, any authenticated user could retrieve process logs via the API. This behavior has been corrected to align with expected permission boundaries and prevent overexposure of operational data.
Requirements
- TEF: 1.65.0
- TED: 1.9.1
Base images
Alpine: 3.17.5 Ubuntu: 22.04.3