Release notes for IBM Cloud Security and Compliance Center Workload Protection
Use these release notes to learn about updates to IBM Cloud® Security and Compliance Center Workload Protection.
April 2025
12 April 2025
- Updates to the IBM Cloud Security and Compliance Center Workload Protection infrastructure
-
IBM Cloud Security and Compliance Center Workload Protection is upgrading its network load balancers and service endpoints infrastructure. With this change the regional endpoints (public and private) use new virtual IP addresses. Action might be required when accessing IBM Cloud Security and Compliance Center Workload Protection:
- If you use an IP address other than the URL domain name
- If you have IP-based allowlists or firewall rules running in your environment
- If you have IP address-specific routing
For details on the changes and the new IP addresses, see Endpoints.
7 April 2025
- Posture for Windows Servers
- This feature provides compliance scanning for standalone Windows Server hosts, enabling security and regulatory compliance checks for Windows environments. With this release, CIS Windows Server 2022 Benchmark v3.0.0 and CIS Windows Server 2019 Benchmark v3.0.1 Posture policies are provided. For installation, see Managing the Workload Protection agent on Windows Servers.
- Host Scanning for Windows Servers
- This feature provides coverage for Windows Server operating system vulnerabilities sourced from Microsoft Security Response Center. In addition, the Windows Workload Protection agent detects any non operating-system package vulnerabilities. A single agent supports both Posture and Host Scanning features. For installation, see Managing the Workload Protection agent on Windows Servers.
- Power Virtual Server Cloud Security Posture Management
- Workload Protection now supports PowerVS resources as part of its Cloud Security Posture Management (CSPM) feature. Supported resources includes PowerVS Workspaces, Instances, Instance Volumnes, Networks, Network Security Groups and Public Networks. Any existing Workload Protection with IBM Cloud CSPM enabled will automatically begin collecting PowerVS resources.
March 2025
27 March 2025
- Tenant-Aware Hierarchical Posture Scanning
- IBM Cloud is introducing Tenant-Aware Hierarchical Posture Scanning, a new capability designed to streamline posture management in multi-tenant environments. This feature allows parent tenants to seamlessly integrate posture scanning results from child tenants, ensuring consistent policy application and reporting while eliminating the need for complex cross-region data transfers. To activate the Tenant-Aware Hierarchical Posture Scanning feature, customers must contact IBM Cloud Support. Our team will assist with enabling the feature and guiding you through the setup process to ensure smooth integration into your environment.
- In-Use for Linux Hosts is now available in IBM Cloud
- Starting with IBM Cloud Linux v13.8.0, you can recognize In-Use Packages on hosts. This addition extends IBM Cloud coverage and helps reduce scope of vulnerabilities you should care about first for remediation; further reducing noise in an ever expanding VM landscape.
19 March 2025
- Resource Report (CSV) is now available in Workload Protection
- Resource Report generates a CSV that includes Compliance results with the resource details: Name, CRN, Control status, remediation, posture policy, resource labels and many more details. Scope the report to the policy you prefer: Financial Services framework, CIS Benchmark for IBM Cloud or Kubernetes, DORA or PCI that you can schedule daily, weekly or monthly. Start today by accessing your Workload Protection UI and navigating to the Reporting page and selecting New Schedule.
February 2025
26 February 2025
- Deprecation of v1beta1 APIs for Scanning Engine
- As of 25 February 2025, the following APIs are deprecated:
- /secure/vulnerability/v1beta1/runtime-results
- /secure/vulnerability/v1beta1/registry-results
- /secure/vulnerability/v1beta1/pipeline-results
- /secure/vulnerability/v1beta1/results/
The API v1 enhances consistency and alignment with platform API standards, and offers improved response schema:
- /secure/vulnerability/v1/runtime-results
- /secure/vulnerability/v1beta1/registry-results
- /secure/vulnerability/v1/pipeline-results
- /secure/vulnerability/v1/results/
If you are currently working with v1beta1 APIs, you must migrate to the new APIs by 1 September, 2025.
18 February 2025
- Custom Risks for IBM Cloud
- Custom Risks empowers your security team to tackle unique security challenges by defining, writing, and executing custom risk patterns. Create adaptive queries tailored to your specific environment and risk tolerance, then build graph queries and save them as Custom Risks for ongoing management. Start today by accessing your Workload Protection UI and navigating to the Risks page and selecting Custom Risks.
- Graph Search for IBM Cloud
- This feature lets you explore and access data on GraphDB by querying entities and relationships with SysQL, including all IBM Cloud findings. The intuitive query builder ensures a seamless experience and lets you proactively identify risky patterns before they escalate into full-fledged threats. Start today by accessing your Workload Protection UI and navigating to the Inventory page and selecting Search.
- Posture management for Oracle Cloud Infrastructure (OCI)
- Workload Protection now provides out-of-the-box posture policies and controls for Oracle Cloud Infrastructure (OCI), including graph-based security analytics and custom risks.
13 February 2025
- Information Technology Security Guidance (ITSG-33) now available in Workload Protection
- Workload Protection now provides an out-of-the-box policy and controls for Information Technology Security Guidance (ITSG-33). This policy can be leveraged to manage the overall posture for hybrid multicloud environments including IBM Cloud, AWS, Azure, GCP, Kubernetes and Linux.
January 2025
13 January 2025
- Posture Management for AIX servers on PowerVS
- SCC Workload Protection now provides posture compliance for AIX operating system, including multiple out-of-the-box policies For more information, check out Managing the Workload Protection agent in AIX on PowerVS.
- Compliance Readiness Report
- You can generate a PDF of the Compliance Readiness Report, providing an overview of the current state of a compliance policy. The report highlights the status of passing requirements and controls, along with the count of passing and failing resources for each control.
- Malware Control Policy
- SCC Workload Protection is releasing a new Runtime Threat Policy for Malware Detection. You can now detect Malware being executed in your environment by detecting the known malware hashes and utilize YARA rules to enhance the detection capabilities. Create a new Malware Control Policy under Policies > Runtime Policies.
October 2024
10 October 2024
- Now Generally Available: Posture Management for IBM Cloud in SCC Workload Protection
- SCC Workload Protection now provides posture management (CSPM) for IBM Cloud resources with regulatory and industry leading out-of-the-box policies, a unified compliance posture dashboard with detailed remediation guidance and a comprehensive view of assets across hybrid multicloud.
For more information, check out About IBM Cloud Security Posture Management (CSPM).
September 2024
30 September 2024
- Full custom controls for CSPM
- You can now create Custom Controls for CSPM via Terraform. Define your REGO code, remediation playbooks and severity from scratch to meet your compliance requirements
- Package Deny List for Vulnerability rules
- The new Package Deny list vulnerability rule lets you control which packages are allowed in your codebase. By defining these rules, you can enforce stricter security measures and maintain tighter control over your software artifacts.
- New Posture Policies
- Workload Protection now includes Posture Policies for Bottlerocket, Rocky Linux 9, Ubuntu 20, Ubuntu 22, RHEL 8, and RHEL 9. These new policies are designed to help you maintain security compliance across a broader range of Linux distributions.
August 2024
20 August 2024
- Identify Network Exposure in Inventory
-
The new added Network Exposure tab in Inventory shows the reason and how resources are exposed. It supports Hosts and Workloads.
- Resource Packages in Inventory
-
You can now use the Packages module in Inventory to track the vulnerabilities and the analyzed packages of your images.
In addition, you can filter by Package to find all workloads with a specific package in your environment.
-
Layered Analysis Workload Protection now analyzes the image hierarchy exposing the layer each vulnerability has been identified or from which packages introduce each layer. Better ownership and remediation details are included now by differentiating the base image and application layers and including a new set of recommendations to fix the major issues identified in the image.
July 2024
8 July 2024
IBM Cloud® Security and Compliance Center Workload Protection now supports Cloud Security Posture Management (CSPM) for IBM Cloud resources with the IBM Cloud Framework for Financial Services, Digital Operational Resilience Act (DORA), CIS IBM Cloud Foundations Benchmark, PCI, and many other industry related or best practices standards.
April 2024
16 April 2024
Workload Protection announces support for Risks, a module that consolidates all findings from your multi-cloud environment and includes an attack path analysis to help you prioritize the major detected risks.
29 April 2024
Workload Protection announces support for Managing the Workload Protection agent in Linux on PowerVS.
February 2024
8 February 2024
Workload Protection announces the ability to deploy and manage an agent on Satellite using a Helm chart.
20 February 2024
Workload Protection announces support for Inventory, a detailed view of all your resources across your multi-cloud environments (AWS, Azure and Google Public Cloud), Kubernetes environments (such as IKS, ROKS, or any other Kubernetes platform) as well as your container images.
January 2024
18 January 2024
- Deprecation of Sysdig Secure + Monitor plan in IBM Cloud Monitoring
- As of 18 January 2024, the Graduated Tier - Sysdig Secure + Monitor plan in IBM Cloud Monitoring is deprecated. For current Workload Protection users, there is no change to functionality. However, if you are currently working with the Sysdig Secure through IBM Cloud Monitoring, you must move to a Workload Protection based plan by the 18 August 2024 to maintain the same functionality. For more information about the transition see the frequently asked questions.
- Deprecation of version 1 of the scanning engine
- As of 18 January 2024, Version 1 of the scanning engine in Workload Protection is deprecated. The functionality is replaced by a new scanning engine with better performance and more capabilities. Any new instances that are created starting today are automically configured to use the new engine. If you are currently working with an existing instance, you must migrate to the new engine by 18 January, 2025. When you migrate, you must also move from the legacy node-analyzer to the new one. In some cases, uninstalling and reinstalling by using Helm is the simplest approach. If you are working with a pipeline or registry scanning, you will need to start using the new scanning components. Learn more about scanning engines.
September 2023
18 September 2023
- New vulnerability scanning engine available
- Workload Protection announces the new vulnerability scanning engine is now available.
May 2023
10 May 2023
- Availability in additional regions
- Workload Protection is available for use in multiple regions.
April 2023
14 April 2023
- Limited availability
- Workload Protection is available for limited use in the
us-east
region.