# v8

{% hint style="info" %}
We released v9.00.000 of our solution in August 2024. If you haven't already updated and are running an older version you can review release details for previous versions on this page.

We recommend you [upgrade](https://help.cloudstoragesec.com/product-upgrades) your deployment to the latest version to receive the latest features, improvements, and bug fixes. Please note you'll need to [upgrade to the latest current version](https://help.cloudstoragesec.com/trouble-shooting/error-when-upgrading-to-the-latest-major-version) you're on before you can upgrade to the next major version.

If you need to find the release notes for v9 you can [click here](https://help.cloudstoragesec.com/release-notes/v9).
{% endhint %}

## February 2026 - Console: v8.08.003, Agent: v8.08.003

In this release:

**Proxy Configuration Bugfix**

* Fixed a bug impacting Cognito communication when the Proxy feature is used

{% hint style="info" %}
**v8.08.003 Cloud Formation Template**

[v8.08.003](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.08.003.yaml)
{% endhint %}

## May 2025 - Console: v8.08.002, Agent: v8.08.002

In this release:

**Large File Scanning Improvements**

* Fixed a bug impacting Large File Scanning in GovCloud

{% hint style="info" %}
**v8.08.002 Cloud Formation Template**

[v8.08.002](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.08.002.yaml)
{% endhint %}

## May 2025 - Console: v8.08.001, Agent: v8.08.001

In this release:

**Large File Scanning Improvements**

* Improved error logging for Large File Scanning

{% hint style="info" %}
**v8.08.001 Cloud Formation Template**

[v8.08.001](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.08.001.yaml)
{% endhint %}

## May 2025 - Console: v8.08.000, Agent: v8.08.000

In this release:

**Console Two Bucket System Improvements**

For the Console version of the two bucket system:

* If the system is unable to move the file, scanning still occurs
* New logging added to detect when files are unable to move
* ScanResults log group now indicate which bucket the file was moved to&#x20;

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2Fad8fJv4SJ9hrrejv6MGe%2Fimage.png?alt=media&#x26;token=e6a360ae-7b9f-4750-8195-1b20bf7a9131" alt=""><figcaption></figcaption></figure>

**Upgrade Procedure Improvements**

* Improved the upgrade procedure to avoid "Finishing Console Update" issues
* New modal to catalogue error, click close to allow access to the Console

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FbAdYIsTi1sYQgoMdfxnW%2Fimage.png?alt=media&#x26;token=0d3eded1-1692-4aba-b86b-ce200aa1d3c8" alt=""><figcaption></figcaption></figure>

**Updated Sophos Engine**

* The Sophos AV Engine has been updated to v3.94.3

**Vulnerability Patching**

* Various vulnerability fixes have been implemented

**Various Improvements and Bug Fixes**&#x20;

* Improved the upgrade procedure to avoid "Finishing Console Update" issues
* UI Fixes for the Jobs page
* Added the s3:PutObjectVersionTagging in the Terraform Linked Account module
* Fixed a bug where the application was unable to parse the "$or" keyword in custom SNS subscription filters
* Fixed a bug impacting Large File Scanning in GovCloud&#x20;
* Fixed a bug where prefixes occasionally failed to persist through updates
* Fixed a bug affecting skip lists
* Fixed a bug where license configuration was affecting AV Engine selection
* Fixed a bug where BYOL deployments occasionally attempted to contact Marketplace

{% hint style="info" %}
**v8.08.000 Cloud Formation Template**

[v8.08.000](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.08.000.yaml)
{% endhint %}

## April 2025 - Console: v8.07.003, Agent: v8.07.003

In this release:

**Patch to update AWS Marketplace listings.** There is no need to update to this version as there are no infrastructure changes.

## April 2025 - Console: v8.07.002, Agent: v8.07.002

In this release:

**Updated our SSL Certificate.** Be sure to update to this version to avoid SSL browser errors!

**Various Improvements and Bug Fixes**

* Fixed a bug where the Proxy option in the CFT caused issues with deployment
* Migrated certain logs to Trace level to avoid excessive logging
  * Modify the LOG\_LEVEL environment variable to 'Trace' in the Console's task definition to access these logs

{% hint style="info" %}
**v8.07.002 Cloud Formation Template**

[v8.07.002](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.07.002.yaml)
{% endhint %}

## March 2025 - Console: v8.07.001, Agent: v8.07.001

In this release:

**Various Improvements and Bug Fixes**

* UI improvements on the Schedules page
* Fixed a bug where completed jobs were incorrectly being marked as being in an invalid status
* Fixed a bug where 'Suspicious' findings by the Sophos engine didn't surface in the Findings page when multiple engines were being used
* Fixed a bug where users could access certain API actions outside of their group assignment

{% hint style="info" %}
**v8.07.001 Cloud Formation Template**

[v8.07.001](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.07.001.yaml)
{% endhint %}

## March 2025 - Console: v8.07.000, Agent: v8.07.000

In this release:

**Updated Console Navigation**

* We've updated the Console's navigation page to make it more intuitive.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FT3FyuQv9cLXPbcE6ML3g%2Fimage.png?alt=media&#x26;token=c4edbbb7-ff6d-4f0a-8ef0-a5238fbab441" alt=""><figcaption></figcaption></figure>

**Updated Protection UI**

* Protection columns have now been moved to the left-hand side.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FchMQYH6EciuL14yUen53%2Fimage.png?alt=media&#x26;token=8bbbf4a4-9d49-4df7-a957-8e48aff9cd7d" alt=""><figcaption></figcaption></figure>

**API Agent Hardening**

* API Agent has been hardened to prevent against server-side request forgery (SSRF) attacks
* API Agent has been hardened to prevent against path traversal attacks

**Improved Reporting Times**

* Improving reporting time for the following sections to make it more real-time
  * Malware Found Last Week dashboard
  * Total Number of Infected Files dashboard
  * Findings page

**Engine Rename**

* ClamAV has been renamed CSS Secure in the Console

**Various Improvements and Bug Fixes**

* Fixed a bug where Azure Blobs were failing to update in the Console
* Fixed a bug where the Findings page occasionally failed to load
* GCP Retro Scanning Fixes
* UI fixes for the EFS Protection page

{% hint style="info" %}
**v8.07.000 Cloud Formation Template**

[v8.07.000](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.07.000.yaml)
{% endhint %}

## February 2025 - Console: v8.06.001, Agent: v8.06.001

In this release:

**Various Improvements and Bug Fixes**

* Fixed a bug impacting GCP on-demand scanning
* Fixed a bug impacting the API Scanning Agent's ability to process certain URLs

{% hint style="info" %}
**v8.06.001 Cloud Formation Template**

[v8.06.001](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.06.001.yaml)
{% endhint %}

## February 2025 - Console: v8.06.000, Agent: v8.06.000

In this release:

**Quarantine Error and Unscannable Files**

* We now offer the option to quarantine Error and / or Unscannable files

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2Fk4y0TSR52cWFYPpzw2Fd%2Fimage.png?alt=media&#x26;token=a7c3bb65-86f6-4eb8-9ad4-bcc4cadfd2d8" alt=""><figcaption></figcaption></figure>

* Set it in the Configuration > Scan Settings page
* Read more about our finding types [here](https://help.cloudstoragesec.com/console-overview/configuration/scan-settings#object-tag-keys).

**AWS FIPS Endpoint Setting**

* CSS can now use FIPS endpoints for its calls to AWS services. Enable this feature in the CloudFormation template.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FvorXtSoge1GLcWFBxCuI%2Fimage.png?alt=media&#x26;token=61039116-3300-43ce-a828-a47d55571ba6" alt=""><figcaption><p>FIPS Endpoints</p></figcaption></figure>

* Available in both commercial cloud and GovCloud
* Works in U.S. Regions only
* No FIPS for the following API calls:
  * S3 ListBuckets
  * Marketplace MeterUsage
  * Application Auto Scaling (unavailable in commercial cloud, ASG FIPS endpoints **are** available in GovCloud)

**Storage Protection Status and Malware Found Dashboards**

* Storage Protection Status UI panel added
  * Shows total / potected storage container ratio for AWS, Azure, and GCP
* Malware Found Last Week UI panel added
  * Shows malware found in the last week

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2Fa2C8HeUZxe7l2IDGMKEq%2Fimage.png?alt=media&#x26;token=7a05a7e7-fc15-4b64-b403-33861bed365e" alt=""><figcaption><p>UI Updates</p></figcaption></figure>

**Custom KMS key usage for DynamoDB, SNS, and SQS**

* Enable feature in the CloudFormation Template

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FFztbmr9DqiTp3kqV2zHL%2Fimage.png?alt=media&#x26;token=8a6686d0-d1c7-4539-af41-440128d29d3b" alt=""><figcaption></figcaption></figure>

**Various Improvements and Bug Fixes**

* Sophos AV engine updated to version 3.93.1
* Sophos Content Analysis engine updated to version 3.51.0
* Fixed a bug where EventBridge-protected buckets connected to Proactive Notifications were unable to provide an accurate VersionId field
* Fixed a bug where ECS tasks were failing to end
* API Scanning fixes

{% hint style="info" %}
**v8.06.000 Cloud Formation Template**

[v8.06.000](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.06.000.yaml)
{% endhint %}

## February 2025 - Console: v8.05.000, Agent: v8.05.000

In this release:

**Various Improvements and Bug Fixes**

* Retro scans with ScanResult Proactive Notifications now include the VersionId field
* GCP Fixes
* Azure Fixes
* UI Fixes

{% hint style="info" %}
**v8.05.000 Cloud Formation Template**

[v8.05.000](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.05.000.yaml)
{% endhint %}

## January 2025 - Console: v8.04.000, Agent: v8.04.000

In this release:

**CrowdStrike Engine Removal**

* We have removed CrowdStrike as a scanning due to low usage

**GCP Object Scheduled Scanning**

* Users can now link and perform scheduled and on-demand scans on GCP buckets!
* GCP Scanning supports all scanning engines currently offered
* The Console generates a Terraform file to deploy scanning architecture into GCP
* Learn more about linking your GCP Account(s) [here](https://help.cloudstoragesec.com/console-overview/access-management/linked-accounts/linking-a-gcp-account)

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FjWcixbQ4ocamL6cOMpJS%2Fimage.png?alt=media&#x26;token=c1a45e6c-5533-4d3a-af66-b92591d1b339" alt=""><figcaption><p>GCP Buckets Protection</p></figcaption></figure>

**Daily Email Updates**

* Users can set up daily email reports of data scanned
* See findings and problematic at a glance
* Configure in Configuration > Proactive Notifications

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FMpVeXzrStUcmk2BfSksu%2Fimage.png?alt=media&#x26;token=20751f7b-1e21-4aa4-a43a-9df0ec65dfa0" alt=""><figcaption><p>Daily Email Summary</p></figcaption></figure>

**SSO User Roles and Groups Assignment**

* Users provisioned via SSO can be assigned to a default role and group prior to creation to remove the need of manual configuration

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FMmZw8wnDFUOT3MyudYrq%2Fimage.png?alt=media&#x26;token=d3ab57f8-9111-4ecb-97aa-56a1de9e50f1" alt=""><figcaption><p>Default SSO Assignments</p></figcaption></figure>

**CloudFormation EBS, EFS, FSx Opt-Out**

* Added the ability to opt-out of accessing and ingesting EBS, EFS, and FSx volumes
* Configure in the updated CloudFormation Template

**Error Log Dashboard Improvement**

* Added new Error Logs page to assist with troubleshooting

**Security Fixes**&#x20;

* Fixed access control, restricting ReadOnly users from the Console API
* Fixed Open Redirect vulnerability, preventing Console URL manipulation
* Updated jquery to version 3.7.1

**Various Improvements and Bug Fixes**

* For GovCloud deployments launched in AV mode, DC can now be enabled in the License Management page.
* New console deployments will launch with Sophos and CSS Premium as default scanning engines
* Sophos AV Engine updated to 3.92.0
* Fixed a bug where folders were being moved in a 2 bucket system
* Proactive Notification Fixes
* Permissions Fixes
* ClamAV Engine Fixes
* Azure Fixes
* UI Fixes

{% hint style="info" %}
**v8.04.001 Cloud Formation Template**

[v8.04.001](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.04.001.yaml)
{% endhint %}

## December 2024 - Console: v8.03.000, Agent: v8.03.000

In this release:

**General Availability for Azure Blob Scanning**

* You can now scan new and pre-existing files stored in [Azure Blobs](https://help.cloudstoragesec.com/console-overview/protection/azure/blob-containers)
* All scanning engines are available to use for Azure blob scanning
* Learn more about linking your Azure account(s) [here](https://help.cloudstoragesec.com/console-overview/access-management/linked-accounts/linking-an-azure-account)

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FnNJo7bx8N4ajY3pp9FZL%2FScreenshot%202024-12-05%20at%2013.16.24.png?alt=media&#x26;token=674200c3-b603-480c-863f-1bfefb108aa1" alt=""><figcaption></figcaption></figure>

**New CSS Premium Scanning Engine Available**

* We've added a new premium antivirus scanning engine to our solution allowing you to scan files up to 5TB in size
* Use it as your primary scanning engine or as a secondary scanning engine to increase the efficacy of your scan
* This new scanning engine is available for scanning both AWS and Azure storage volumes

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FYS1z2sZh7rALnJU4bBWs%2FScreenshot%202024-12-04%20at%2017.06.21.png?alt=media&#x26;token=3303801a-3ff0-43ba-9890-2d93fb026c9c" alt=""><figcaption></figcaption></figure>

**Linked Account Role Updates to v1.14.001**

* Make sure to update your Linked Account roles to the latest version

**Various Improvements and Bug Fixes**

* FSx fix
* Sophos definition improvements
* Scan Settings page fix
* API Scanning fix
* EventBridge scanning fix
* AWS MarketplaceMetering improvements

{% hint style="info" %}
**v8.03.000 Cloud Formation Template**

[v8.03.000](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.03.000.yaml)
{% endhint %}

## November 2024 - Console: v8.02.001, Agent: v8.02.001

In this release:

**Verbose Logs**

* Capturing S3 Request IDs can now be activated for troubleshooting purposes
* In the Console's task definition, modifying the LOG\_LEVEL environment variable to 'Debug' will now allow the Console to deposit S3 Request IDs into the Console.Buckets log group

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2Fd376xS6LmWQGjNBz9t2U%2Fimage.png?alt=media&#x26;token=95e7354e-a270-416f-bb9d-341036d8f790" alt=""><figcaption><p>S3 Request IDs shown in CloudWatch Log Group: Console.Buckets</p></figcaption></figure>

**Various Improvements and Bug Fixes**

* Logging Fixes
* Console UI Fixes and Improvements
* Large File Scanning Fixes

{% hint style="info" %}
**v8.02.001 Cloud Formation Template**

[v8.02.001](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.02.001.yaml)
{% endhint %}

## October 2024 - Console: v8.02.000, Agent: v8.02.000

In this release:

**Azure Event-based Scanning and Updates (early access)**

* Updated Threat Map includes Azure data

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXeUN2K2Jazgf7jZxMAr2r9Gj1yWRjw0MMjY7RiY0VO8nDUa65JcgJ4RX1LE16yvDoGRZN-Ztzv0ojsvjPyTuqh11ru9pI65DslP7CKSdOszZgciilK_5H-UCu3s-7dyu7ghxHYzbqUiwbP9_xLJn3_zfvuQ?key=xIzLpLMPbUOTNmNfLSIMuA" alt=""><figcaption></figcaption></figure>

* Event protection now enabled in the Console for Blob storage

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdyAjrMwTxn_RcnULtvW-sHeOndFRcBP0fWFcLM6UlFUYR0Dcy4hyYlIvKrPVGhxG8SFku6E5Fq0bBTvj_FgWJtLt0z-qc9Yupk01ifrM-zmPAeJt_V6KyMODuCRUuqY_jSgcGBBoxYH4rNJ5Z9qtU-VYQ?key=xIzLpLMPbUOTNmNfLSIMuA" alt=""><figcaption></figcaption></figure>

* Azure event-based containers now have autoscaling capabilities depending on queue size

<figure><img src="https://lh7-rt.googleusercontent.com/docsz/AD_4nXdgcZ8p1GQVusyC0TpgpOE66f3aL17Rw4re2TMptjt0FQ5A-KKWKqwesoKmaXrff_U-53dwq0NOL2VUAr9yUaVoJdTnOEqH1YT_ys57tTQPVonL-_PF8723P2vG1n4fgIa__5RWzHgD919CmFtbOfI7hphH?key=xIzLpLMPbUOTNmNfLSIMuA" alt=""><figcaption></figcaption></figure>

* Azure event agent settings are now partitioned by accounts
* Agent configuration is now stored in the same storage account to reduce infrastructure costs

**Added customization for SNS topic policy**

* Terraform module now includes the ability to append statements to the SNS Topic Policy

**IAM Improvements**

* We've tightened the permissions in the CloudStorageSecRemotePolicy, removing excessive wildcard permissions with more granularity

**Various Improvements and Bug Fixes**

* ClamAV Private Mirror functionality fixed
* Fixed a bug where lack of ability to reach CloudTrail Lake endpoint was preventing console login
* API agents can now be properly stood up in il-central-1
* Azure fixes and improvements
* UI fixes and improvements
* Event-based scanning fixes
* Retro/on-demand scanning fixes
* Large file scanning fixes

{% hint style="info" %}
**v8.02.000 Cloud Formation Template**

[v8.02.000](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.02.000.yaml)
{% endhint %}

## October 2024 - Console: v8.01.001, Agent: v8.01.001

* Security Hub Findings fixes

{% hint style="info" %}
**v8.01.001 Cloud Formation Template**

[v8.01.001](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.01.001.yaml)
{% endhint %}

## September 2024 - Console: v8.01.000, Agent: v8.01.000

In this release:

**Malware History Report**

* For users that want to get a visual understanding of how malware has been found over time, we’ve added a new page in our Console UI to track historic malware findings
* We leverage Amazon Bedrock to interpret the malware finding to provide a human-readable summary and description of the malware found
* As a result, Amazon Bedrock must be enabled for this feature

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2Fh6E7MHPcqbiIw4VNILj4%2FScreenshot%202024-09-26%20at%2012.27.59.png?alt=media&#x26;token=c4147ae0-e052-4fdf-be93-93bc5f79ff06" alt=""><figcaption></figcaption></figure>

* You can expand a specific identity and view more information around how often it was found
* At this time, this report pulls data from the last 30 days of enabling it and will show information from that point onwards

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FxunyxGTOYHZ0VeDUNSv6%2FScreenshot%202024-09-26%20at%2012.28.13.png?alt=media&#x26;token=62d364c5-5b22-42e2-af67-d0356babcacd" alt=""><figcaption></figcaption></figure>

**Data Classification Quarantine**

* You can now quarantine files found to have PII

**Reporting Bucket Secure Transport**

* We’ve removed HTTP Access to our Console Reporting bucket, which now only accepts HTTPS requests

**Azure Improvements**

* In v8 we introduced Azure Blob Scheduled Scanning. We have a few improvements and fixes for Azure:
  * Scanning Improvements
  * Linked Account Fix
  * Virus Definition Update Fix

**Various Improvements and Bug Fixes**

* Console UI Fixes
* Console UI Improvements
* Console API Improvements
* Proactive Notifications Fix
* Proactive Monitor now clean SQS queues left

{% hint style="info" %}
**v8.01.000 Cloud Formation Template**

[v8.01.000](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.01.000.yaml)
{% endhint %}

## August 2024 - Console: v8.00.000, Agent: v8.00.000

In this release:

**Azure Blob Scheduled Scanning (early access)**

* You can now link Azure accounts into your AV console and ingest any Azure blobs you have, allowing you to perform a scheduled retro scan on any pre-existing files stored within your Azure Blobs.
* While we currently only support Retro scanning for Azure Blob we will expand to support event-based scanning in an upcoming release in the near future.
* Want to get early access to Azure Blob scanning? [Contact us](https://help.cloudstoragesec.com/contact-us) and we can assist!

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FFPNIvVtUBrVUY8HiLcM6%2FScreenshot%202024-09-04%20at%2010.01.51.png?alt=media&#x26;token=f8f83c46-f7e7-4394-938c-e2e1fe4ec92b" alt=""><figcaption><p>Azure Blobs</p></figcaption></figure>

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FpGmKO6c6TQD3MasVsvvg%2FScreenshot%202024-09-04%20at%2010.05.26.png?alt=media&#x26;token=0225f830-6f48-40a9-bc7f-3f91f2978717" alt=""><figcaption><p>Linked AWS and Azure Accounts</p></figcaption></figure>

**Minimized Permissions**

* We've updated our CloudFormation template to use customer managed IAM policies vs inline IAM policies. We've done this to ensure we're using the minimum permissions required to deploy our solution.
* If you have IAM policies or Service Control Policies that prevent creating customer managed policies, you'll need an exception for this upgrade. You can refer to [Managed policies and inline policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html#customer-managed-policies) for more information.

**Threat Map UI Updates**

* Infection and Classification titles on the right panel were changed to "Malware" and "Sensitive Data".
* Legend at the bottom left shows "No Malware or Sensitive Data", " "Malware Found", "Suspicious Files or Sensitive Data Found".
* Legend icons view can be toggled by clicking on it.
* Regional information drill-down option navigates to Problem Files/Findings page w/ filters applied when clicked on

**Bucket Size and Object Count Metrics Fixed**

* We've improved how we calculate bucket size and object count for each S3 bucket that we ingest on the Bucket Protection page.

**Various Improvements and Bug Fixes**

* EFS Volume Scanning Fixes
* EBS Volume Fixes
* API Scanning Fixes
* TerraForm Module Fixes

{% hint style="info" %}
v8.00.000 CloudFormation Template

[v8.00.000](https://css-cft-versions.s3.amazonaws.com/ConsoleCloudFormationTemplate-v8.00.000.yaml)
{% endhint %}
