SaaS: Sysdig Secure Release Notes
You may also want to review the update log for Falco rules used in the Policy Editor: Falco Rules Changelog.
Dates shown are for the initial release of a feature. The feature may not be be rolled out to all regions concurrently and availability of a feature in a particular region will depend on scheduling.
Supported Web Browsers: Sysdig supports, tests, and verifies the latest versions of Chrome and Firefox. Other browsers may also work, but are not tested in the same way.
January 19, 2023
Host Scanning Enhancements and General Availability
Vulnerability management for Hosts has received several upgrades and is now considered General Availability.
Newly supported Host OSes
- Alibaba Cloud Linux (a.k.a. Aliyun Linux)
- Google Container-Optimized OS (COS), build 89+
See all supported Host OSes.
Host Vulnerability Reporting
Now it is possible to create scheduled vulnerability reports targeting the Hosts which are scanned with the Sysdig product.
From the Reports function in Sysdig Secure, you can now select if you want to target the
Runtime Workloads or
Note that scope labels and report columns will follow the Host Scanning metadata, i.e.
Cloud Provider Region.
January 17, 2023
CSPM Compliance GA Released
Sysdig is pleased to announce the GA release of the new CSPM Compliance module. Focus your compliance results on your most important environments and applications!
New features introduced:
- Compliance Page - a new compliance page is introduced - ordered by your zones!
- CSPM Zones Management
- A default Entire Infrastructure zone is created for each customer
- Create your own zone:
- Define scopes for the resources you want to evaluate
- Apply a policy to your zone to add it to the compliance page
- 40+ new Risk and Compliance Policies included
To get to know our path from detection to remediation, risk acceptance, zones management, installation and migration guidelines, please review the documentation.
Note that the new compliance module is not available for IBM Cloud and OnPrem users. They should continue taking advantage of Unified Compliance.
January 5, 2023
IaC Scanning now Supports Terraform AWS
Sysdig is releasing support for Terraform resources from the AWS Provider. If you have implemented Git IaC Scanning, then pull request checks will now scan AWS resources and report violations of the CIS AWS Foundations Benchmark.
The list of supported resource and source types is now:
- Kubernetes workloads in YAML manifests
- Kubernetes workloads in Kustomize
- Kubernetes workloads in Helm charts
- Kubernetes workloads in Terraform
- AWS cloud resources in Terraform
Other changes in the release include improved Kubernetes resources scanning in Terraform to support additional use cases.
For more information please check our IaC Security documentation
December 21, 2022
Additional Feeds for Golang Added to Vulnerability Management
Sysdig has added feeds to detect a wider range of Golang-related vulnerabilities. By extracting the packages declared in Golang binaries, we are surfacing vulns in the libraries used to build those binaries. In particular:
This added feature could translate to net-new vulnerabilities for assets that have been already analyzed.
December 20, 2022
Vulnerability Host Scanning for Google COS Added
Google COS support has been added to the (preview feature) Host Scanning.
Host Scanning is installed by default when deploying with the Helm chart
sysdig-deploy version 1.5.0+.
- Note that Google COS support requires
The new directories added to the default set scanned include:
Generic binaries (such as docker/containerd and infra tooling)
Libraries (such as default python libs)
GoogleCOS tooling directories
December 15, 2022
Sysdig Agent Health Dashboards Enhanced
We are happy to announce that the Sysdig Agents page under Data Sources has been updated to enhance visibility into the health of Sysdig Agents. You can now:
- Filter Agents by their Health Status, version, and environment including Account ID, Cluster, and Node.
- View your Total Connected Agent Count over time
December 13, 2022
Platform Audit UI
We are happy to announce that the Sysdig Platform Audit now has a UI within the Sysdig application, in addition to the existing API.
With the UI you can:
Filter audit data based on multiple criteria for easier searching
Filter within a specific date range
View full details of a given audit event
December 1, 2022
Vulnerability Management for Hosts (Preview)
Sysdig is deploying all-new host scanning capabilities for vulnerability management. The hosts that support your workloads and containers are a critical part of your infrastructure security. They can even offer a more attractive target for attackers than containerized software, due to the lateral movement possibilities they offer.
Sysdig’s host scanning and integrated vulnerability management features unify runtime workloads and their associated hosts under a single streamlined interface and user flow. The provide visibility over the full infrastructure security posture.
Host Scanning is installed by default when deploying with the Helm chart
sysdig-deploy version 1.5.0+.
See the documentation for more about the supported Host OSes, CPU architectures, alternative installation methods, and how to use the feature.
November 30, 2022
JIRA Ticketing Integration
Sysdig is pleased to announce the release of the JIRA Ticketing feature. Users can now open JIRA tickets within the Secure UI and assign them to team members directly. The first iteration will allow customers to open tickets from Identity Recommendations from the Home page.
Vulnerability Management Accept Risk (Exceptions)
Sysdig’s Vulnerability Management policies already allow a user to configure thresholds to surface the most relevant data, e.g. Critical vulnerabilities with a Fix available. Still, complex organizations also require the ability to introduce exceptions (for false positives, preconditions that don’t apply, etc.).
“Accepting Risk” is now available as a Vulnerability Management feature in Sysdig Secure.
You can accept the risk of individual CVEs or entire hosts or container images, and can define specific contexts such as package types and expirations dates. The Sysdig UI highlights the risks that have been accepted and can filter for them.
This feature requires that you have deployed Sysdig with sysdig-deploy Helm chart version v1.5.0+ with vuln-runtime-scanner version 1.4.0+ and sysdig-cli scanner v1.3.0+.
See here to check your versions and upgrade if needed.
November 21, 2022
CSPM Compliance: Reporting & API Preview Released
Sysdig is pleased to announce the Preview release of CSPM Compliance Reporting and API.
This feature includes the ability to:
- Download CSV directly from the compliance results view
- Download CSV directly from the results view of a specific control
- Receive JSON of compliance results directly via API for:
- Compliance Overview
- Compliance Results
- Control Resource Lists
Link Policies to Your Organization’s Runbooks
Sysdig Threat Detection policies now include the option to specify a Runbook link with each policy. If the policy triggers an event, the Runbook link will be displayed in the event details, as well as in the notification. This allows users to tie their security triage processes directly into Sysdig Secure.
November 7, 2022
Usability Improvements for Secure Events
Link Events to Network Activity, Tuner, View Rule
To help security investigators distinguish false positives from real issues, it can be helpful to review the associated network activity. We are adding a link to Sysdig’s Network Typology visualization directly into relevant event details, under the Respond button.
Similarly, where applicable, the Runtime Policy Tuning feature will show up under the Respond button. The user can go through the flow to add exceptions and reduce false positives.
Finally, we’ve added the ability to view the rule definition from the event details panel. You can see the event details and the rule definition side-by-side.
See the documentation for details.
Rule Names Added to Event Notifications
The notifications for runtime events have been enhanced to include a rule name. For Email, Slack, and Microsoft Team, the rule name will be a link to the rule definition.
October 26, 2022
New Secure Event Forwarder Integration: Google Security Command Center
A new integration has been released for Sysdig Secure’s Event Forwarder functionality: Google SCC
October 24, 2022
New Home Page
Sysdig is pleased to announce the release of a new Home page! This feature is open for all customers. The Home page offers a clean, visual representation of the most important issues in your environment and a curated list of the top tasks required. The top half encompasses the Dashboards and includes:
- Visual charts highlighting areas of concern within your environments with ability to filter
- Drill down into relevant product area scoped for what was clicked on
- Full screen Dashboard capabilities
The bottom half encompasses the To Do Recommendations list and will:.
- Guide users to take the most impactful actions to reduce security risks in their environments
- Offer tailored recommendations with aggregated and prioritized tasks
September 20, 2022
Disable a Rule within a Policy
Starting today, customers can disable (and re-enable) individual rules within threat detection policies. This allows:
- Using a subset of rules within a managed policy or managed ruleset without giving up the ability to receive new rule updates.
- Temporarily disabling a noisy rule until the cause is investigated or an appropriate exception is put in place.
September 19, 2022
Actionable Compliance - Control Library Preview Released
Sysdig is pleased to announce the Preview release of CSPM Control Library in Actionable Compliance.
This is a technical preview release and the feature is open for all customers.This feature includes:
- Visibility of all available controls
- Filter for specific controls by control attributes
Read more about the feature here.
August 29, 2022
Actionable Compliance - Custom Policies Preview Released
Sysdig is pleased to announce the Preview release of CSPM Custom Policies in Actionable Compliance.
This is a technical preview release and the feature is open for all customers.
This feature includes:
- Clone an existing policy and edit its metadata
- Create, Edit & Delete a custom policy
- Create, Edit & Delete requirements in a custom policy
- Link & Unlink available controls to policy requirements
You can read more about the feature in Sysdig’s documentation.
Coming soon in Actionable Compliance:
- Control Library
- Creating your own custom control in a custom policy
August 17, 2022
New Permission for Changing Team Roles
Team management has been improved with the addition of the new permission, Team Membership Roles. This new permission will allow you to change the roles of team members separately while adding users to the teams.
For more information, see:
August 10, 2022
Machine Learning Policies
A new machine-learning-based detection capability is available in Sysdig Secure.
While we strongly believe in our Falco-based rule approach, and do not consider machine learning to be the best way to detect every threat, we understand that specific use cases such as Cryptominer detections require a different approach. This is the first detection capability available in our Machine Learning policies. Read more about how to configure them and how they work here.
August 4, 2022
Agent Overview Page Released in Data Sources (Preview)
An Agents overview page in the Data Sources |Integrations interface has been made available in Technology Preview for all customers. This new page shows all of the Sysdig Agents that have reported into the Sysdig backend, and enables the user to quickly determine:
- Which agents are up-to-date, out of date, or approaching being out of date
- Which managed clusters have been detected in your cloud environment, but have not yet been instrumented with the Sysdig agent
The feature will remain in Technology Preview, as we add additional functionality and refine the workflows within the page.
See also: Data Sources | Sysdig Agents
Actionable Compliance - CSPM Policies Preview Released
Sysdig is pleased to announce the Preview release of CSPM Policies in Actionable Compliance. This is a technical preview release, and the feature is open for all customers.
This feature includes:
- See what is being evaluated by the Actionable Compliance feature in the context of compliance standards (CIS, NIST, etc.)
- Review the policy structure and the controls connected to it
- Enable/disable controls
- Filter controls by enablement status, violation severity, name, and control type
The features are under development and will soon include the ability to create custom CSPM policies as well.
Read more in CSMP Policies (Preview).
July 28, 2022
Managed Threat Detection Policies
Starting today all existing customers will see all existing policies labeld as
Custom Policies and with a list of disabled
Managed Policies. The existing custom policies work exactly as they have always worked, and do not require any action from the user to make changes. However to get the power of the Sysdig Threat Research team, we recommending moving over to the new managed policies. You can read more about the different types of managed policies here.
July 21, 2022
Actionable Compliance - Accept Risk Preview Released
Sysdig is pleased to announce the Preview release of Risk Acceptance in Actionable Compliance, This is a technical preview release, and the feature is open for all customers. This feature includes:
Improving compliance score by Accepting a risk on a failing resource in a control
Registering an Acceptance reason and expiration date
Editing and revoking acceptance
Compliance views - summary of accepted risks
Violation results mini-inventory - filtering by Accepted resources
You can read more about the feature in the documentation.
June 23, 2022
New Secure Event Forwarder Integrations: Elasticsearch & Microsoft Sentinel
Two new integrations have been released for Sysdig Secure’s Event Forwarder functionality:
June 2, 2022
Actionable Compliance Preview Released
Sysdig is pleased to announce the first Preview release of Actionable Compliance, the next phase of the Sysdig Secure compliance offering and the first capability to support KSPM, and in the future also CSPM. This is a technical preview release, and the feature is open for all customers.This feature includes:
- Compliance views - a redesigned summary view for each built-in policy
- Violation results - the first-ever mini-inventory to show violated resources with filtering capabilities
- Actionable Remediation - automatically open a Pull Request to remediate a resource violation in its git stored source file (Infrastructure as Code)
Inventory based collection - a paradigm shift in how we collect CSPM data - bring it raw!
New agent collector - gathers all Kubernetes objects (workloads, subjects, roles, etc.) from the customer for Inventory future use
New node-analyzer container - collects the node’s Kubernetes, Linux & docker configurations
8 new micro-services
OPA based policies - built-in policies (previously benchmarks) with OPA controls (previously rules) for Kubernetes, docker & Linux
You can read more about the feature in Sysdig’s documentation
May 23, 2022
A custom role is an admin-defined role that allows Sysdig administrators to bundle a set of permissions and assign those permissions to individual users or teams. Custom roles allow for finer-grained definition beyond the standard out-of-the-box Sysdig Roles. Once defined, a custom role can be assigned to any user inside a particular team, and also be configured as the default role for new users in that team. For more information, see Custom Roles.
The addition of custom roles into the platform is transparent, meaning that standard roles and assignments that already exist will not experience any changes.
May 19, 2022
Menu Option to Display New and/or Old Scanning Interfaces
To facilitate a smooth transition from the Legacy Scanning Engine to the new Sysdig Secure Vulnerability Management, the Settings Menu now provides options for displaying the UI for the new, legacy, or both scanning engines.
Safe and transparent: This is a non-intrusive change; regardless of how you have the current
New Vulnerabilities engine toggle set, the Sysdig Secure navigation menu will not be modified without explicit user intervention. And the toggles will only alter the user interface and not impact the function or running of the engine itself.
To enable/disable: See Which Scanning Engine to Use
If both are enabled: The two sets of features are clearly distinguished in the Navigation menu.
May 18, 2022
Policy Advisor Deprecation Notice
Sysdig Policy Advisor will be removed from all Sysdig accounts on June 17, 2022.
Policy Advisor was built during a time when PodSecurityPolicies (PSPs) were the only way to add Security Policies to a Kubernetes workload. PSPs have now been deprecated in Kubernetes 1.21, released more than a year ago.
May 17, 2022
Runtime Scanner 1.0.3 Released
- Optimized requests performed on the Kubernetes API
See also: Vulnerabilities | Runtime
May 4, 2022
Sysdig Platform Audit
We are glad to announce that Sysdig Platform now supports the capability of tracking, logging and reporting on all changes in the system.
- Track all activities on the API level
- Retention period: 90 days
- Simple API for retrieving audit information (no UI)
- Events Forwarding support to be included in the near future (to be announced)
- Enabled by default for all SaaS customers
See also: Sysdig Platform Audit
Sysdig Platform Login Banner
We would like to announce that Sysdig Monitor and Secure now allow you to define a Login Message that will be presented to all users. Added to boost Sysdig compliance/enterprise readiness, requested originally by the IRS.
- Users are not allowed to access the system until they acknowledge the message
- One login banner per customer
- Only Admin users can enable/update the message
- Single banner for both Monitor and Secure (for Platform customers)
- Available on SaaS for all customers
See also: Configure Login Message
May 3, 2022
Insights Feature GA
This release marks the general availability (GA) of the Secure Insights feature. Some of the changes introduced include:
- Better support for Azure events
- AWS IAM permission integration
- Bug fixes for policy tuner flow
- Limit for displaying events in a time range removed
May 2, 2022
DriftControl Policies: Detect and Prevent Drift in Container Runtime
Sysdig agent can now detect when a new executable was added to a container after a container has started up. The agent collects when a file was downloaded and made executable. When using
prevention mode, the agent can also deny the process from ever running. A policy can also be used to define binaries that should be denied/excluded from being denied if they have been added after the container has started.
See also: Drift Policy
April 28, 2022
Component Security Fixes
The following Sysdig Secure components were updated with the latest security patches (April 2022):
April 20, 2022
New Vulnerability Management Engine
Sysdig is pleased to announce the New Vulnerability Management engine, a major upgrade to the vulnerability and image scanning functionality for the Sysdig Secure product.
Scanning times have been drastically reduced: 8x faster on average!
Additional data for vulnerabilities and remediation
- CVSS scores and metrics: Network Attack Vector, Privileges required, etc.
- Flagging of publicly available code Exploits
- Suggested package fix version
Risk spotlight Focus on the vulnerabilities that Sysdig detects in active packages at runtime.
- This is a new filter that only shows CVEs with active packages, to save time browsing infrastructure and to help focus on high-impact CVEs
New Vulnerability Reporting module
- Up to 14 days retention of individual reports
- “Generate now” immediate scheduling directly available from the UI
Flexible policies that can be attached to the different runtime and security contexts
How to Move to the New Scanning Engine
The new vulnerability management engine uses a different data storage, API, host components, and user interfaces than the legacy scanning.
- Contact your Sysdig representative; she/he will guide you through the process of migrating your subscription and vulnerability management configuration to the new engine.
- Full documentation available here.
March 8, 2022
Scanning Component Updates
The following components have been upgraded to the listed versions with bug fixes and security updates:
March 3, 2022
New CIEM Features
User Risk Labels
Risk Labels are now surfaced to highlight insecure attributes for specific Users and Roles. They are listed within the Users & Roles page and within the User Details tab of a specific user.
Trend Charts in Overview
Time charts are now available within the Overview tab of Identity and Access. These help to visualize your Permission trends over time for Users, Policies, and Resources.
CSV Report Export
All of the pages within Identity and Access can now be exported as a CSV file. Select the Download CSV button found at the top right corner of all pages.
Effective Permission Calculation
AWS supports different types of policies to limit permissions on different scopes. Sysdig has added support for calculating effective permissions based on permission boundaries and organization level service control policy (SCP). This gives additional context when viewing permissions set on identities. For example, an identity that has been given administrator level identity policy will be limited in overall permissions if there is a permission boundary policy attached to it.
CIEM Data in Insights
Within the Cloud Activity and User Activity views in Insights, there is now an Identity and Access tab. This will help investigative flows to understand the context from an IAM perspective.
March 1, 2022
New: Data Sources Instrumentation
On the Data Sources >
Managed Kubernetes page: For unconnected clusters, Sysdig has added quick instrumentation instructions using the known details about the cluster, such as the cloud account, region, and cluster name.
February 28, 2022
New: Data Sources Features
The Datasources page now tracks all Managed Kubernetes Clusters, and if they have been connected or not connected. This can help determine if a sysdig agent is no longer reporting to the Sysdig backend should it go down for any reason, such as not having enough resources to install. Each node will also report on the agent version installed at that time.
Sysdig has added quick instrumentation instruction to a Managed Kubernetes Cluster using the known details about the Kubernetes Cluster, such as the cloud account, region, and cluster name.
February 10, 2022
Improved Usability with New Navigation
Sysdig’s new navigation improves the usability of the left-hand navigation for faster and easier navigation of where you’re trying to go.
Check out a video walk-through of the new feature!
Improved Menu Handling
Hoverable Sub-Menu: With each module that has additional menu options, hover over the respective module to quickly navigate.
Collapsible Main Menu: Save space with the collapsible left-hand navigation.
New Menu Option: Integrations
A dedicated Integrations menu option provides an easy way to access both inbound and outbound integrations.
- Access the Cloud Accounts page to quickly understand which applications and services are running, and where the Sysdig agent is installed.
- Access Managed Kubernetes to get a catalog for all the managed Kubernetes clusters in your environment. The status shown is
connected/unconnectedbased on whether the agent is installed or not.
- 3rd Party: Manage your Git Integrations
Outbound: Manage your Event Forwarding, Notification Channels, and S3 Capture Storage
3rd Party: Manage your Git Integrations
Revamped User Menu
Now all the settings options are collected and exposed in one mega menu. Find the right page before navigating away from where you are.
February 2, 2022
Enhanced Unified Filter for Event Feed
The Sysdig Secure Event Feed is getting a new unified filtering experience, available now for SaaS accounts.
Easily toggle from the original to the cleaner, simpler enhanced version, where you will find:
- Unified scopes, free text and any other filterable/searchable attributes on a single lean bar
- Autocomplete on keys and values
- Autocomplete/suggest operands
- One-click quick filtering directly from the list of displayed elements
- Saved filters in various formats– no more retyping common filter expressions
- Favorite filters, stored per user and feature
- Default filters, per user and feature
- Recent filters, per user and feature
See also: Secure Events
January 26, 2022
Unified Compliance Reporting
We are pleased to announce a rework of our Compliance and Benchmarking capabilities. This change brings a number of improvements:
- Compliance and Benchmark tasks are now scheduled, managed, and generate reports in an updated and unified interface, including simpler pathways to remediation and easier-to-navigate reports.
- The logic used to check individual controls now checks for events signalling control failures, as well as ensuring the correct Runtime rules are configured to detect these events. This leads to a more comprehensive audit that captures activity as well as configuration.
- New compliance standards and platforms: added
- For workload, AWS, GCP, and Azure:
- NIST 800-82 Rev2
- For workload and AWS:
- Fedramp (workload and AWS only)
- HITRUST CSF 9.4.2 (workload and AWS only)
- For GCP and Azure
- ISO 27001:2003
- NIST 800-53 Rev4
- NIST 800-53 Rev5
- NIST 800-171
- NIST 800-190
- PCI / DSS v3.2.1
- SOC 2
- For workload, AWS, GCP, and Azure:
Agent version >=
Node analyzer installed
NOTE: If you are upgrading from an earlier version of Sysdig Secure, your existing compliance and benchmark records will be migrated to the new version and retained on the same schedule as before.
See also: Compliance
New Feature: Review Applied Kubernetes Network Policies
Sysdig Secure has added the ability to view the KNPs that have been applied directly from the Network Security Policy UI.
Review the relevant policies applied to the pod-to-pod communication for the current view
View Policyto see the raw
yamloutput of the network policy applied to that workload.
See also: Netsec Policy Generation
January 2, 2022
Infrastructure-as-Code (IaC) is an important part of today’s cloud-native infrastructure. We at Sysdig know that the earlier you identify possible posture issues, the better off you are.
The new feature allows you to integrate Kubernetes IaC checks into your Git pipeline. With just a few clicks, the standard compliance checks will be integrated into the Pull Request (PR) flow and alert developers when they create violations of the policy before they merge.
Supportability & Requirements
The new capability will use either an application or a webhook in your respective git provider.
- Github - Github Application
- Gitlab - Webhook
- Azure DevOps - Webhook
- Bitbucket - Webhook
For each provider you can define the repos and folders to protect, as well as branches on which to perform the evaluation.
See also: Git IaC Scanning
2021 Archive of Sysdig Secure (SaaS) released features.
2020 Archive of Sysdig Secure (SaaS) release notes.
2019 Archive of Sysdig Secure (SaaS) release notes.
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.