Security Testing Orchestration release notes
These release notes describe recent changes to Harness Security Testing Orchestration (NextGen SaaS).
- Progressive deployment: Harness deploys changes to Harness SaaS clusters on a progressive basis. This means that the features described in these release notes may not be immediately available in your cluster. To identify the cluster that hosts your account, go to your Account Overview page in Harness. In the new UI, go to Account Settings, Account Details, General, Account Details, and then Platform Service Versions.
- Security advisories: Harness publishes security advisories for every release. Go to the Harness Trust Center to request access to the security advisories.
- More release notes: Go to Harness Release Notes to explore all Harness release notes, including module, delegate, Self-Managed Enterprise Edition, and FirstGen release notes.
June 2024
Version 1.97
New feature
- The STO API is now generally available and publicly documented. For more information, go to STO in the Harness API documentation. (STO-5281)
Fixed issues
-
Updates to Burp Enterprise orchestration to resolve multiple issues. (STO-7635, ZD-64154)
- Added another API call to resolve a Burp schedule item iD to its corresponding latest Burp scan ID.
- Added logic to perform updates on matching Burp sites rather than trying to create a new Burp site with the same name.
- Removed default port from being set by runner and will only set port if user specifies in the step.
-
Fixed an issue where a updated runner image caused repository scans to fail in some cases. (STO-7634, ZD-64116)
-
Implemented a fix to improve data processing times for certain edge cases. (STO-7521, ZD-62602, ZD-62694)
May 2024
Version 1.96.2
Fixed issues
-
Fixed an issue where running an orchestrated Burp scan resulted in the runtime error
No matching scan configurations
. (STO-7585, ZD-63508) -
Fixed a Jira integration issue that allowed tickets to be created for issues that were not in a target baseline. When the Ticket Summary page was viewed from these tickets, they produced a vague error page. This fix prevents the creation of new non-baseline tickets and improves the error messages shown for existing tickets. (STO-7394, ZD-60778)
-
Fixed a Jira integration issue where setting the default Jira project and issue type in the External Tickets page resulted in duplicated database records and an error response from the ticketing service. (STO-7485)
Version 1.95.0
New features and enhancements
-
The default behavior for Semgrep orchestration scans has changed. Semgrep steps now include the following rulesets. (STO-7560)
Fixed issues
-
Fixed a Prisma Cloud step issue where
twistcli
didn't honor step-level variables when running in Harness Cloud. You can setJOB_NAME
in the Settings field in a Prisma Cloud step, and thereby add a searchable tab in the Prisma Cloud UI. This functionality is now available on Harness Cloud as well as Kubernetes and local build infrastructures. (STO-7508, ZD-61272) -
Fixed an issue where a Wiz step failed when it scanned a package that had policies applied to it but no vulnerabilities. (STO-7573, STO-7575, ZD-63342)
- Fixed an issue where Security Tests showed all detected issues as new when comparing the current scan against the baseline branch, even when the baseline was correctly specified in Test Targets. With this fix, you can simply run an affected pipeline again and produce correct results. (STO-7575, STO-7582, ZD-63551, ZD-73374)
Version 1.94.4
New features
-
You can now use Plugin steps and GitHub Action steps in Security stages without a CI license. (STO-7442)
-
You can now scan code repositories using the Grype scan step. (STO-7531)
Fixed issues
-
Fixed an issue where the Built-in Grype step would time out when uploading scan results. (STO-7464, ZD-61941)
-
Fixed an issue where OPA failed with the error
Unexpected error occurred while evaluating Policies
. With this fix, STO limits the number of occurrences per issue (max 1000) that it sends to OPA. (STO-7562, ZD-63083)
April 2024
UI update 1.15.0
Early access feature: Built-in SAST scans
This release introduces a new built-in SAST step that adds a preconfigured Semgrep step that's ready to run as soon as you add it. (STO-7180)
This step is behind the feature flag STO_ONE_CLICK_SAST
. Contact Harness Support to enable it.
New feature: Orchestrated Semgrep scans
Harness STO now supports running Semgrep scans in Orchestration mode. (STO-7142)
STO Manager version 1.22.1
New features and enhancements
-
Harness is in the process of updating the STO UI. The following changes are cosmetic and do not affect the underlying YAML definitions of STO pipelines. Harness expects all of these changes to be deployed in all namespaces by the end of April 2024.
-
The Security Tests stage is now called Security when you add a new stage and select the stage type. (STO-7384)
-
The Custom Scan step is used for scanner integrations that do not have their own configuration step. Previously, this step was called Security. This step also has a new icon. (STO-7385)
Custom Scan appears at the end of the list of Security Test steps in the Step Library.
-
-
Harness STO now supports ingesting scan results in stages that run on ARM64 build infrastructures. This eliminates the need to cache results from a previous ARM64 stage and then ingest them in a stage on a supported platform. (STO-7236)
Fixed issues
- Fixed a UI issue where the Context Name field in the ZAP step did not capture the specified file. (STO-7287)
Version 1.92.1
Fixed issues
-
Fixed an issue with pull-down filters in STO dashboards: If a pipeline had no issues detected, the pipeline would appear in some filters but not others. This fix ensures consistent behavior: all dashboard filters show only pipelines with detected issues. (STO-7179, ZD-58614)
-
Introduced a fix to ensure that Git-triggered pipelines run correctly when the Repository Name is specified as a runtime input. (STO-7029, ZD-55622)
Version 1.90.1
New features and enhancements
- OWASP scan steps can now load Java certificates. (STO-7220)
- The Black Duck Hub scan step has been upgraded to use Synopsis Detect 9.5.0. This is a major feature release with new features, enhancements, and fixed issues. (STO-7353, ZD-60592)
Fixed issues
- Fixed an issue where the Test Targets page would display an error for certain projects. (STO-7399)
- Fixed an issue where spidering in a ZAP scan resulted in the error
Unable to find binary in default location
. (STO-7316) - Fixed an issue where ZAP scans that required authentication resulted in the error
Scanner object has no attribute 'hostname'
. This fix also includes changes to the shared paths where you need to include ZAP scripts in your pipeline. For more information, go to Important notes in the ZAP scanner reference. (STO-7288) - ZAP is no longer a part of OWASP. The UI and documentation have been updated to remove references to OWASP ZAP. (STO-7296)
- Removed “Inactive options are coming soon” from the Request Exemption dialog box. All options in this dialog box are generally available. (STO-7297)
March 2024
Version 189.2
Features that are no longer behind feature flags
The following features are now generally available:
- OPA policies for Security Test results
- Target and variant auto-detection for scanners with configurable UIs
- Open Source Vulnerabilities (OSV) scanner integration
New features and enhancements
-
The AWS Security Hub scan step now supports passing
AWS_SESSION_TOKEN
as an environment variable to support session-based authentication with AWS. You can pass the token as a key-value pair in the Settings field. (STO-6371, ZD-48947) -
Issues tables in Security Tests now include a Target column. (STO-4918)
-
Harness STO now supports ingesting scan results in stages that run on Harness Cloud Windows AMD64 build infrastructures. This eliminates the need to cache results from a previous Windows stage and then ingest them in a Linux stage. (STO-5428)
Fixed issues
-
Fixed an issue with database migrations that impacted upgrading Self-Managed Platform from version 0.13.x to 0.14.x. (STO-7309)
-
Fixed a UI issue in Security Tests when the same issue was detected by multiple scans in the same pipeline. The Issues table showed multiple identical rows for that issue, and clicking on an issue selected all of the identical rows. With this fix, the rows are differentiated by Target. Clicking on an issue selects only that one issue. (STO-4918)
Version 1.88.2
Early access feature: built-in scanners
-
This release introduces a new set of built-in steps for adding scans to your pipelines quickly and with minimal configuration. The scanners used in these steps are free to STO users and are ready to run as soon as you add them to your pipeline. (STO-6738)
noteThese steps are behind the feature flag
STO_ONE_CLICK
. Contact Harness Support to enable these steps.You can add built-in scanners for the following scan types:
-
Secret Detection Add a GitLeaks scan to detect passwords and other secrets in your code repositories.
-
SCA Add an OWASP Dependency Check or OSV scan to detect vulnerabilities in your open-source libraries and packages.
-
Container Add an Aqua Trivy or Anchor Grype scan to detect vulnerabilities in your container images.
-
DAST Add a Zed Attack Proxy (ZAP) scan to detect vulnerabilities in your application instances.
-
Early Access feature: Wiz scanner integration
You can include Wiz vulnerability scans in your Harness pipelines. Wiz is a cloud security platform that scans IaC templates, container images, and directories/repositories before deployment. Wiz can detect security misconfigurations, vulnerabilities, and exposed secrets. (STO-6035)
Harness currently supports the following:
- Orchestrated Wiz scans for container images
- Ingestion of Wiz scan reports ( JSON/SARIF format ) generated for container images, repositories, and directories
This integration is behind the feature flag STO_STEP_PALETTE_WIZ
. Contact Harness Support to enable it.
Fixed issues
-
Fixed a UI issue that prevented the Exemptions page from loading for some accounts. (STO-7266)
-
Implemented a UI fix to ensure that the STO UI correctly renders scanner output formatted in markdown. (STO-6881)
-
Improved UI wording in the Exemptions table when an exemption applies to multiple issues. (STO-6700)
Version 1.87.4
New feature: Ingest Aqua Security assurance policy violations
The Aqua Security step can now ingest assurance policy violations. These violations appear as INFO-level issues in Security Tests. (STO-7164)
The Aqua Security step also publishes a new output variable, EXTERNAL_POLICY_FAILURES
, that captures the number of assurance policy violations detected by the scan. You can use this variable to enforce governance policies if the pipeline detects any assurance policy violations. (STO-6499)
For more information, go to:
- Workflow description for creating STO governance policies
- Exclude vulnerabilities using STO output variables
New feature: AIDA remediations for STO stage failures
- AIDA remediations are now available for STO stage failures. (STO-6966, STO-7254, ZD-56426, ZD-59425)
Version 1.87.2
New enhancement
- The Pipeline Execution > Security Tests > Issue Details pane now includes a link to the scanned target on the Test Targets page. This link is included for all issues. Previously, only the Exemptions > Issues Details pane included this link. (STO-7114)
Fixed issues
-
Fixed an issue that prevented the Exemptions page from loading in some accounts. (STO-7263, ZD-59507)
-
Fixed an issue in the Test Targets page that delayed UI updates after each keystroke when a user entered a RegEx baseline. (STO-7242)
Version 1.86.1
Early access feature: default regular expressions for target baselines
You can specify default baselines for specific target types: code repositories, container images, application instances, and configurations. STO includes a set of predefined defaults for repository and container image targets. The default baseline for repositories is master
or main
. The default for images is latest
or the most recently scanned Semantic Version number if it can be detected. (STO-7127)
Currently, this feature is behind the Feature Flag STO_BASELINE_DEFAULTING
. Contact Harness Support to enable the feature.
For more information, go to Default RegEx baselines by target type.
Version 1.85.0
New feature: Auto-detect targets and variants
Security Tests steps with configurable UIs, such as Aqua Trivy, Semgrep, and ZAP, now include an auto-detect option for targets and variants. This option eliminates the need to specify the target variant manually. (STO-6704)
- For container images, the step detects the target and variant using the Container Image Name and Tag defined in the step or runtime input.
- For code repositories, the step detects these values using
git
:- To detect the target, the step runs
git config --get remote.origin.url
. - To detect the variant, the step runs
git rev-parse --abbrev-ref HEAD
. The default assumption is that theHEAD
branch is the one you want to scan.
- To detect the target, the step runs
- For application instances, the step detects these values as follows:
- The target is based on the Instance Domain and Path defined in the step or runtime input, for example,
https://qa.jpgr.org:3002/login/us
. - The variant is the timestamp when the step scanned the instance.
- The target is based on the Instance Domain and Path defined in the step or runtime input, for example,
New feature: OPA policies for Security Test results
You can now write and enforce OPA policies against your security tests, and stop your pipelines if a security test has any issues that violate your policies.(STO-6738)
This greatly extends the range of policies that you can use to stop pipelines. Previously, STO only supported OPA policies against severity output variables.
This release includes a set of security test policy samples, which make it easy to create policies such as:
-
A security test cannot include any issues in a list of severities such as Critical or New Critical.
-
A security test cannot include any issues for CVEs past a certain age, for example no critical-severity CVEs more than three years old.
-
A security test cannot include any issues in a list of titles such as
libsqlite3
orjavascript.express.security.audit
. -
A security test cannot include any more than 75 occurrences of TAR-related issues (issue title matches regex
".*tar.*"
). -
A security test cannot include any issues in a list of reference IDs such as CWE-78 or CVE-2023-52138.
For more information, go to Stop pipelines using OPA.
New feature: Open Source Vulnerabilities (OSV) scanner integration
You can scan your code repositories using Open Source Vulnerabilities (OSV), a tool that finds existing vulnerabilities that affect your project's dependencies. (STO-6767)
Fixed issues
-
STO output variables are now supported within nested step groups. (STO-6973, ZD-56586, ZD-58121)
-
Upgraded
twistcli
to version 32.03.123 in the Twistlock scanner image to resolve intermittent 400 response errors. (STO-7223) -
Previously, the ingestion engine assigned a scan type of SAST to all SARIF data by default. As a result, the STO UI would display SARIF scan results as SAST even when they were not. With this fix, the ingestion engine assigns the correct scan type based on the scan results. (STO-7176, ZD-58495)
-
Fixed an issue that would cause a pipeline creation or update to fail if a Security Tests stage used a Harness Code repository. (STO-7208)
-
Fixed an issue where the Aqua Security normalizer copied top-level scan data across all raw issues, which caused the wrong reference identifiers to be shown across all issues in the same scan. This fix ensures that all new Aqua Security issues have the correct reference identifiers and vulnerability data. (STO-7140)
-
With this release, the STO UI shows expiration values for Approved and Expired exemptions only. (STO-6786)
February 2024
Version 1.84.0
Enhancements
-
The Issues table in Issue Details and the Exemptions tables now include popups for issues whose original severities were overridden by a Snyk security policy. (STO-6927)
-
This release includes back-end improvements to ensure that dashboards refresh less than five minutes after a database update. (STO-7084, ZD-57533)
-
This release introduces a new behavior when the baseline for a target changes. (STO-7105)
-
Previous behavior:
When Security Tests showed scan results, it categorized issues as Only in <target>:<variant> and Remediated by comparing the scanned variant to the baseline specified at the time the page was loaded.
-
New behavior:
The baseline for a scan is fixed when STO ingests the results. Only in <target>:<variant> and Remediated issues are based on the baseline specified at the time of the scan.
Harness has introduced this behavior to avoid ambiguous or unexpected results when a target baseline changes. This can happen automatically when a pipeline uses dynamic baselines based on regular expressions. This new behavior also ensures that the Security Tests UI for a given pipeline execution always uses the same criteria to categorize issues as Only in <target>:<variant> and Remediated.
-
Version 1.83.1
Deprecation notice: SonarQube support for scans in Java 11
SonarQube has deprecated support for running scans in a Java 11 runtime environment. It can still scan older Java code, but the scanner must be run in Java 17. Upgrading the the scanner to Java 17 is incompatible with older SonarQube servers. You might need to upgrade your SonarQube server version because of this change. (STO-6970, ZD-57092)
Enhancements
-
You can now configure a Snyk step to show the original score when a Snyk Enterprise security policy overrode the severity of an issue coming from the
snyk
CLI. You can see this information in Issue Details. (STO-7041) -
Implemented back-end changes to improve performance and scalability when processing scan results. (STO-7037)
Fixed issues
-
Fixed a UI issue where the Exemptions page would show the incorrect severity of an issue if that severity was overridden after the original scan. (STO-7069)
-
The SonarQube integration includes better support for orchestrated branch and pull-request scanning with SonarQube Enterprise. (STO-7122, STO-6840, STO-6857, ZD-58021, ZD-55282, ZD-55592)
- Previously, the orchestration scan step downloaded results for the main or master branch regardless of the branch specified in the runtime input or the pull request.
- With this enhancement, the orchestration step always downloads results for the scanned branch or pull request.
- Branch scans require no additional configuration.
- To configure pull-request scans, go to SonarQube pull-request scan configuration.
January 2024
Version 1.81
Fixed issue
Fixed an issue on Self-Managed Enterprise Edition platforms where approving or rejecting an exemption threw a 500 error. (STO-6958)
Version 1.80.1
Feature enhancements
-
You can now run STO scans with a CI Free license. In a CI Build step, select Add step and then go to Security and Security Tests in the step library. All STO steps are available. The only limits to this functionality are those imposed by the CI Free license. (STO-6824)
-
The Security Tests UI displays a more helpful, accurate message when no issues match the show/hide filters. (STO-6919)
January 11 runner update
Feature enhancements
-
You can now scan .exe and .net files using the OWASP scan step. (STO-6852, ZD-55558)
-
OWASP scans now display the package name and version for all issues. (STO-6725)
Version 1.78
Fixed issue
- Version incompatibility between Harness services resulted in STO pipelines failing on the
git clone
step in some specific cases. The issue was resolved via rollback. (STO-6905, ZD-56022)
December 2023
Version 1.77.1
New enhancement
This release introduces a behavior change when ingesting SARIF data. Previously, issues with a level of Error in SARIF got assigned a severity of Critical in STO. These issues now get assigned a severity of High. (STO-6845, ZD-55359)
Fixed issue
Fixed an issue where the SonarQube step was assigning incorrect values to the Java Binaries setting. (STO-6808)
Version 1.76
New enhancements
-
Added a new setting for Checkmarx scans, which is useful when you want STO to exclude issues detected by Checkmarx but flagged as Not Exploitable. (STO-6712, ZD-53483)
To enable this setting, go to the Checkmarx or Security step and add the following key-value pair under Settings:
hide_not_exploitable
:True
-
The expiration time for an exemption now starts when the exemption is approved. (STO-6604)
Fixed issue
Fixed an issue where only the first run in a SARIF file was being ingested. This occurred when Snyk was configured with the --all-projects
flag. (STO-6832, ZD-55065)
November 2023
Version 1.75.1
New enhancement
- Browser windows and tabs have more descriptive titles to improve navigation across the primary STO windows. (STO-4555)
- STO Overview
- Test Targets
- Exemptions
- STO Getting Started
Version 1.74.1
New features and enhancements
-
You can now ingest container-image scan results from Aqua Security Enterprise. This integration was previously behind the feature flag
STO_STEP_PALETTE_AQUASEC
but is now generally available. (STO-5661, ZD-41491) -
The Exemptions table now shows the pipeline name in the Scope column and not the ID. This keeps the user experience consistent with other areas of the application. (STO-6631)
Fixed issues
-
Fixed an issue that caused the Issue Details pane to show target names from other projects in the same account. (STO-6693)
-
Fixed a back-end API linking issue that could cause rendering/linking issues in the Security Tests tab. (STO-6586)
Version 1.73.1
Early access feature
You can now scan your repositories and other components used in your code with Anchore Enterprise, a scanner that provides visibility into supply chain security risks. This integration was previously behind the feature flag STO_STEP_PALETTE_AQUASEC
but is now generally available. (STO-6382)
Fixed issues
-
Fixed a configuration issue in a back-end service that prevented AIDA from generating remediation steps. (STO-6610)
-
Fixed a UI issue where the module sidebar in the left-side menu would scroll when a user clicked different menus within STO. With this fix, the module sidebar maintains its position when a user clicks different menus. (STO-6219)
-
Fixed a UI issue in the Security Tests tab where the Stage and Step pull-down filters showed the
identifier
fields. These filters now show thename
fields, which are more human-readable. (STO-6629)
Previous releases
Jan-Oct 2023 releases
Jan-Oct 2023 releases
October 2023
Version 1.72.0
New features and enhancements
-
You can now provide feedback about the AIDA-generated remediation step for a selected issue. (STO-6593)
-
The following Early Availability features are now generally available:
-
You can specify a time limit when you request an exemption. (STO-6367, formerly behind feature flag
STO_TIMEBOUND_EXEMPTIONS
)The Exemptions table includes a Time Remaining column that shows when each exemption is scheduled to expire. The table is sorted by this column by default so that soonest-to-expire exemptions are listed first.
-
You can click on a row in the Exemptions table to view details for the issue associated with that exemption. (STO-5056, formerly behind feature flag
STO_EXEMPTION_DETAILS
)For best results in STO, you should specify a baseline for every target. To encourage this, the Exemption Details pane hides details for an issue if there is no baseline detected. To specify the baseline, select Set in Targets.
-
The Security Tests tab includes a set of Security Executions pull-down menus so you can filter the issue lists by Target, Target Type, Step, Stage, and Scanner. (STO-5212, formerly behind feature flag
STO_DROPDOWN_FILTERS
).
-
Fixed issues
-
Updated the UI terminology to better communicate the relationship between issues in the current scan vs. previous scans. (STO-6613)
The Security Test UI now uses the following labels to describe issues found in the current scan that are common to previous scans:
- Common to <target>:<variant> Issues also found in the last scan of the specified variant.
- Common to previous scan
- Issues also found in the last scan (if the scanned target has no baseline), OR
- Issues also found in the last scan of the baseline (if the scanned variant is the baseline).
- Common to previous / baseline scan Issues also found in the both the last scan of the specified variant AND the last scan of the baseline.
-
Fixed a UI issue in Security Tests when all vulnerabilities detected in a scan had exemptions. The tab showed "No Security Issues Found", all issue counts were 0, and no issues appeared in the UI even when the selected filter included exempted issues. (STO-6642)
Version 1.71.1
Early access
- Updated the exemptions page to bubble up soon-to-expire exemptions to the top of the list. Available in the time bound exemption early access feature available behind the STO_TIMEBOUND_EXEMPTIONS flag. Contact Harness Support to enable the feature. (STO-6367)
Fixed issues
- The STO dashboard used a marketplace graph which was not available in hosted environments. A new native graph has been chosen so the Security Issues (Overall) graph will be available on all environments. (STO-6613)
- Updated the icon for a false positive exemption to match the other icons (STO-6555)
Version 1.70.1
New features and enhancements
- Improved the look and feel of the exemptions page, and added information about the severity of the issue associated with exemptions and exemption requests. (STO-6592)
Early access
-
Added support for Matrix pipelines to the pipeline execution results filters
This fixes an issue in a feature behind the Feature Flag
STO_DROPDOWN_FILTERS
. Contact Harness Support to enable the feature. (STO-6405)
Version 1.69.3
Early access
-
This release includes the following UI enhancements for working with exemptions. (STO-6078)
-
You can click on a row in the Exemptions table to view details for the issue associated with that exemption.
-
For best results in STO, you should specify a baseline for every target. To encourage this, the Exemption Details pane hides details for an issue if there is no baseline detected. To specify the baseline, select Set in Targets.
These enhancements are behind the Feature Flag
STO_EXEMPTION_DETAILS
. Contact Harness Support to enable the feature. (STO-5056) -
Fixed issue
- Occurrences page size longer resets on page update. (STO-6472)
September 2023
Version 1.68.0
Fixed issues
-
Fixed the following UI issues in in Security Tests:
-
Users with view access for Security Issues at the Project level, but not the Account level, could not view issue details. (STO-6421)
-
Some scanners such as Gitleaks would appear with the label Unknown Scan Tool rather than the correct product name. (STO-6454, STO-6337)
-
Added an Exclude field to the SonarQube step and removed the Include step. The Exclude field corresponds to the
sonar.exclusions
setting, which you can use to narrow the focus of a SonarQube scan. (STO-6441)
-
Version 1.67.2
New features and enhancements
- In the STO Overview, Today's Snapshot shows new and remediated issue counts if today's issue counts include any newly detected vulnerabilities or new remddiations. (STO-4998)
Fixed issues
-
Fixed an issue with setting up SSL certificates in Checkmarx, which caused Java keytools to fail. Upgrading to JDK-11 fixed the issue. (STO-6512)
-
Implemented fixes to improve scan times for large jobs using Checkmarx, Snyk, and other scanners. (STO-6408, STO-5676, ZD-49328, ZD-41409, ZD-42436, ZD-49383)