2023.12.11

Changes in Veza release v2023.12.11

Access Intelligence

New Features

  • EAC-28821: Users can now add custom notes to entities on the Risks > Risks tab, and add a suppression reason when marking an exception. These fields can provide extra context for a decision or track the remediation status for a particular entity.

  • EAC-30245: Out-of-the-box assessments with a critical or warning risk level now include descriptions, shown when clicking Show Explanation on the Risks page.

Access Monitoring

New Features

Access Reviews

New Features

  • EAC-29978 Review Access for Unique Users (Early Access): Added an option to automatically open the Show Users list to filter results for a single identity when opening a certification.

Enhancements

  • EAC-12684: Access Reviews APIs and webhook payloads now return summary entities in a path_summary_nodes array, when specified by a Workflow query.

Access Visibility

Enhancements

  • EAC-30426: Clicking a risk score in Query Builder now opens a modal explaining how scores are calculated.

Bug Fixes

  • EAC-30255: Optimized performance for Query Builder exports.

  • EAC-30447: Fixed an issue with single-entity Query Builder search for Workday Security Group not opening in Authorization Graph.

Lifecycle Management

Enhancements

  • EAC-30377: Provisioning rules can now be deleted.

Veza Integrations

New Features

  • EAC-28553 Confluent: New integration for gathering Confluent Cloud Users, Groups, and Roles.

  • EAC-29036 1Password: New integration for gathering Users and Groups from 1Password.

  • EAC-28142 Privacera: New integration for gathering Privacera Users, Roles, and Groups.

Enhancements

  • FR-1638, EAC-30378 Okta MFA Types: Okta Users now have an MFA Factors attribute listing the types of multi-factor authentication enabled for their account.

  • EAC-29239 Reduced AWS Resource-based "Deny"-All Policy Statement Connections: AWS resource-based policy statements with a "Deny" Effect on all (*) principals are now connected to individual principals in the Veza Graph only if the statement overrides an "Allow" effect on the same resource from another policy.

Veza Platform

Enhancements

  • EAC-30080: Administrators can now assign teams and roles for individual users on the User Management page.

Last updated