HomeGuidesChangelog
Changelog

Added

  • Job to Automation Manager to import snyk files from an S3 bucket

Changed

  • Expand config sourcing for AWS creds across all commands

Fixed

  • AWS auth login to resolve credentials from init.yaml
  • CloudWatch evidence upload (httpx multipart files format)
  • Missing wiz integration compliance report
  • HTTPX client using the wrong domain

Removed

  • OpenText flat file job in Automation Manager since it was creating import errors in Automation Manager

[6.29.22.1] - 2026-02-25

Fixed

  • cicd builds

[6.29.22.0] - 2026-02-25

Added

  • Tenable WAS (Web Application Scanning) integration with sync_findings and sync_apps commands
  • Old CMMC v1 catalog control pattern support (e.g., AC.L1-3.1.1) in the control matcher framework

[6.29.20.01] - 2026-02-24

Added

  • Adding --dry-run, --offset, and --limit options for all scanner integration sync commands (AWS, Wiz, Tenable, Qualys, SentinelOne, Prisma, Defender, Tanium, Azure) enabling parallel job splitting
  • BigQuery asset synchronization with dry-run mode and pagination for parallel processing

Changed

Fixed

  • SafeYaml processes improved to prevent overwrite and invalid default values in init.yaml

[6.29.0.2] - 2026-02-24

Fixes

  • Previously submitted RegML SSP Author jobs now load consistently in “View Previous.”
  • Updated questionnaire permission validation for external users.
  • Resolved an issue where expired records did not trigger bell notifications and owners were not emailed.
  • Fixed RegML SSP Author’s top “Save” button not persisting edited extracted statements.
  • Resolved an issue where RegML SSP Author returned “No extractable data” when using Policies as the source.
  • Fixed filters not working on extracted statements in RegML SSP Author.
  • Fixed RegML Control Author not saving generated statements.
  • Prevented RegML Text Editor from committing generated content when the user closes without saving.
  • Fixed Questionnaire Grading Rules that were not firing correctly.
  • Fixed an issue where radio buttons appeared blank after a questionnaire was submitted and reopened or rejected.
  • Restored Automation Manager functionality for AWS integrations.
  • Fixed browser caching issues causing stale UI behavior.
  • Fixed extracted statements in RegML SSP Author being smashed and not horizontally scrollable.
  • Fixed issue with inherited controls not showing up for non-administrative accounts.

Changes

  • Removed misleading “Completed X statements extracted” banner from RegML SSP Author.

[6.29.19.20] - 2026-02-21

Added

  • AWS CloudWatch sync with pagination support ( command) for parallel job processing with dry-run mode to report total log group count and offset/limit parameters for distributed processing across multiple workers
  • IssueAssetMapping model for mapping issues to assets with CRUD, batch create, and query-by-issue/asset support
  • Axonius V2 integration with asset and vulnerability synchronization using the axonious SDK, supporting hybrid delta sync and saved query strategies
  • OpenText Fortify WebInspect Airflow DAG for automated scan imports
  • Direct AWS SDK credential support (access key, secret key, session token) for OpenText, Trivy, and Grype S3 integrations
  • S3 authentication guide documentation for file import integrations

Changed

  • AWS CloudWatch extended sync command () now supports init.yaml credential configuration and removes explicit credential CLI flags (use init.yaml, environment variables, or --profile instead)
  • AWS CloudWatch evidence processing now uses in-memory compression instead of temporary files, making it Celery-safe for ephemeral containers with limited or readonly filesystems
  • Wiz integration now defaults unknown severity values to "Not Assigned" instead of "Low" to avoid understating risk
  • Wiz async GraphQL client now retries transient failures (429, 500, 502, 503, 504) with exponential backoff before failing
  • Wiz authentication fallback now tries all Cognito URLs instead of only the first one

Fixed

  • AWS no longer hangs during asset cache warming, and now consolidates findings to eliminate duplicate vulnerabilities
  • AWS component mapping no longer produces redundant "mapping already exists" errors for pre-existing components
  • AWS CVE override of no longer breaks finding consolidation for compliance checks sharing the same CVE
  • Qualys Container Security API calls now respect the config setting instead of being hardcoded to
  • Qualys WAS findings pagination now has a safety limit (default 50) to prevent runaway fetches against large or mock servers
  • Scanner integration mopup no longer closes findings from earlier batches during multi-chunk syncs
  • AWS no longer hangs during asset cache warming, and now consolidates findings to eliminate duplicate vulnerabilities
  • AWS component mapping no longer produces redundant "mapping already exists" errors for pre-existing components
  • AWS CVE override of no longer breaks finding consolidation for compliance checks sharing the same CVE
  • Qualys Container Security API calls now respect the config setting instead of being hardcoded to
  • Qualys WAS findings pagination now has a safety limit (default 50) to prevent runaway fetches against large or mock servers
  • Configuration placeholder values no longer use angle brackets that break YAML parsing when fetched from the RegScale API
  • CSAM URL validation no longer incorrectly checks the token variable instead of the URL variable
  • HTTP/2 "Server disconnected" errors during concurrent API requests now automatically retry with exponential backoff instead of failing immediately
  • Prisma Cloud SBOM bulk sync now creates SBOM records and software inventory for matched assets
  • AWS CloudWatch Logs integration failing with ValidationException errors in GovCloud regions due to incomplete ARN construction (missing suffix and wrong partition)
  • Wiz async vulnerability scanner crashing with NoneType error in containerized environments (Fargate/ECS) due to unhandled SystemExit in async event loop
  • FedRAMP Appendix A importer now correctly extracts parameters with multi-parenthetical names and numeric suffixes (e.g., SC-5(a)-1, AC-1(c)(1)-2)
  • FedRAMP Appendix A parameter deduplication no longer produces duplicate warnings due to leading whitespace mismatch between DOCX and markdown parsers
  • FedRAMP Appendix A parameter matching now resolves leading-zero format differences between OSCAL identifiers and RegScale ControlParameter records

[6.29.0.1] - 2026-02-19

Fixed

  • Fixed an issue causing PIA form creation to fail.
  • Resolved a bug where Categorization & Classification search only returned matches for Information Types.
  • Fixed distributed cache not being invalidated on startup.
  • Resolved failing test: .
  • Fixed returning 401 Unauthorized unexpectedly.
  • Fixed Automation Manager UI issues with inconsistent Edit/Delete buttons in Keys and Secrets.
  • Fixed Automation Manager UI bug preventing users from adding new keys.
  • Fixed Automation Manager execution date scaling issue.
  • Fixed Workbench drilldown arrow alignment in Automation Manager UI.
  • Fixed issue where Workbench drilldown into cards failed to load.
  • Fixed Automation Manager UI issue preventing upload of files.
  • Fixed issue preventing deletion of Service Account tokens in Automation Manager.
  • Fixed issue where users were unable to create or update individual secrets in Automation Manager.
  • Fixed issue where scheduling a job returned a 400 error.

Changed

  • Improved UI spacing and padding when adding new key values in Automation Manager.

Implementation Limitations and Known Issues in this Release

  • This release has been tested to be compatible with RegML and Harvester version 6.29.0.0.
  • To avoid unexpected timeouts and being logged out of the application, set the session timeout value greater than the browser inactivity value. Session timeout is being enforced prior to inactivity.
  • There is currently no warning to the end user before being automatically logged out of the application.

[6.29.18.6] - 2026-02-15

Fixed

  • Vulnerabilities from scanner integrations no longer default to Closed status due to concurrent batch mop-up race condition
  • Prisma Cloud container image vulnerabilities now correctly link to their assets via DNS-safe identifier encoding
  • Prisma Cloud SBOM extraction now works on Windows by sanitizing filenames with invalid characters
  • Prisma Cloud vulnerability first_seen and last_seen timestamps now properly set from discovered date for accurate mop-up behavior
  • PASS and NOT_APPLICABLE scan findings no longer create unnecessary POAM issues
  • POAM creation now respects the config setting instead of being disabled

[6.29.18.0] - 2026-02-13

Added

  • Prisma Cloud flag for sync_hosts and sync_images to preview sync without creating records
  • Prisma Cloud and options for paginated sync of hosts and images
  • Prisma Cloud authenticate command now saves token to init.yaml for reuse by sync commands

Changed

  • Prisma Cloud sync_hosts and sync_images commands unified into shared sync logic for consistency
  • Prisma Cloud API client pagination now supports offset and max_items parameters
  • Prisma Cloud API client URL-encodes user input in path segments for safety
  • Shortcut for on Tenable Nessus import command
  • Comprehensive security tests for validate_name_input() function covering 35 command injection attack vectors
  • Shortcut for on Tenable Nessus import command
  • Google BigQuery support for asset synchronization with table and query modes, dry-run counting, pagination for parallel processing, and SQL injection protection
  • AWS CLI parameters standardized to use snake_case as primary naming (e.g., --account_id) with hyphenated aliases for backward compatibility (e.g., --account-id)
  • Processed Nessus files are now organized into date-based subfolders () preserving original filenames

Fixed

  • CLI version command tests failing with AttributeError when importing evidence module during lazy loading
  • Python 3.12+ SyntaxWarning messages when running Tenable CLI commands caused by outdated dependency
  • Prisma vulnerability integration incorrectly using CVE IDs as the field instead of "Vulnerability Assessment", causing inconsistency with other scanner integrations (Qualys, AWS Inspector, SentinelOne, Tanium)
  • Prisma Cloud authentication URL construction using f-strings instead of urljoin
  • Azure Entra evidence collection commands () hitting commercial cloud Graph API endpoints () instead of government cloud endpoints (), causing 401 InvalidCloudInstance errors for Azure Government Cloud tenants
  • Scanner integrations creating zero vulnerabilities and zero severity counts when assets are not pre-matched in the local cache
  • Server-side asset discovery now enabled for vulnerability batch submissions, allowing automatic asset linking when CLI-side matching is unavailable
  • Application config tests failing in Python 3.13+ due to file write buffering causing race conditions between save and load operations in parallel test execution

[6.29.0.0] - 2026-02-13

AppBuilder Phase 1 Release - Business Unit Segmentation

This release introduces Business Unit (BU) segmentation, enabling organizations to manage multiple teams, departments, or portfolio entities within a single tenant—without requiring separate logins or environments.

With centralized governance at the HQ level and clear data separation at the BU level, organizations gain stronger security, simplified administration, and a more tailored user experience across complex enterprise structures.


What’s New

Business Unit Management

Organizations can now create and manage Business Units (BUs) within a single tenant. HQ administrators retain centralized oversight while delegating day-to-day administration to BU-level admins.

This enables:

  • Separation of departments, subsidiaries, or portfolio companies
  • Simplified management without duplicating tenants
  • Clear ownership and accountability at each organizational level

Data Isolation by Business Unit

All records are now scoped to a Business Unit, ensuring users only see and interact with data belonging to the BU(s) they are authorized to access.

This improves:

  • Data security and privacy
  • Regulatory and contractual compliance
  • Confidence when managing multiple organizations in one environment

Granular Access & Default Permissions

Access control has been enhanced with default record permissions applied at creation time, configurable per application and module.

Benefits include:

  • Reduced risk of overexposure
  • Consistent access enforcement
  • Less manual permission management

Granular Group Permission Definement

Groups have been enhanced with granular CRUD permissioning.

Benefits include:

  • Granular Access Controls for Users in a Group
  • Fully Customizable "Roles" via Group Creation

Centralized HQ Configuration

HQ administrators can centrally manage and enforce tenant-wide configurations, including:

  • Single Sign-On (SSO) with limitations
  • Access roles
  • Default Legacy Groups are migrated over into the initial default App as Group Roles

Multi-BU User Experience

Users who have access to multiple Business Units can:

  • Switch between BUs within the application

Implementation Limitations and Known Issues in this Release

  • Once creating an App you cannot delete the created App.
  • RegML Compatibility: Impact is limited to fresh deployments. Existing tenants upgrading to 6.29.0.0 aren't affected. A gap exists when there's no pre-existing Harvester-SA to migrate — i.e., a brand new database. RegML accounts will need to be created manually. Go to the Default App → Service Accounts tab → create "Harvester-SA" manually.
  • Roles will be deprecated going forward. To accommadate this there will be groups created that mirror the permission list of the former roles. This is only the case if a user in the tenant had that role explicitly assigned to them. Meaning if no user had the General User role assigned to them then no group will be created to mimic that role's behavior.
  • SSO Compatibility: Previous SSO assignments are only compatible with the Default App in a Tenant if that Group Exists upon upgrade. New SSO Assignments will follow a new naming schema. This naming schema is in the format of "RegScale-GroupId:{id}". There is button on the groups list to easily capture this name.
  • When logging in with SSO user, the group configured in the Identity Provider will be assigned automatically to that user and will not be removed. If you want to change the group assignment at a later time in the Identity Provider the user will still be in the old group and also in the new group. The user can be manually removed from the old group in the App if that is the desired state.
  • Retired APIs (i.e. RBAC, Groups , etc.). Many APIs do not apply any longer with the architecture changes of this relese and have either been removed or changed. They cannot be backward compatible due to the non-backward compatible nature of the changes required for this release. (See list below in Changes section)

Who This Is For

  • Enterprises managing multiple departments or subsidiaries
  • Organizations overseeing acquisitions or portfolio companies
  • Managed Security Service Providers (MSSPs)
  • Customers seeking stronger governance with less operational overhead

Additions

  • Business Unit (BU) Architecture

    • Introduced Business Unit segmentation to support multi-organization tenants.
    • Added BU-level admins, user assignment, and enforced access hierarchy.
    • Enabled switching between Business Units with isolated data and permissions.
    • Implemented default record permissions and CRUD access per module.
  • Access Control & RBAC Enhancements

    • Added module-level permission enforcement across APIs and UI.
    • Introduced cascading permissions with optional inheritance from parent records.
    • Added warnings when changing records from Public to Private.
    • Expanded support for app-scoped, group-based Service Account permissions.
    • Added missing RBAC endpoints and improved permission validation feedback.
  • Platform & App Builder Enhancements

    • Added cross-app reporting (feature-flagged).
    • Added Access Request feature (feature-flagged).
    • Improved App Builder configuration and setup workflows.
    • Added background processing for long-running permission propagation.
    • Introduced improved caching services for users, permissions, and modules.
  • SSO & Authentication

    • Enhanced SSO configuration and role handling across tenants and BUs.
    • Added MFA improvements and validation handling.
    • Improved global admin login handling across environments.

Fixes

  • Security Plans (SSP)

    • Fixed risks, issues, vulnerabilities, and control implementations not appearing in SSPs.
    • Resolved permission propagation failures when switching SSPs between Public and Private.
    • Fixed child records not inheriting or reverting access correctly.
    • Resolved 500/504 errors when adding controls or populating implementations.
    • Fixed missing UI updates when adding controls or profiles.
  • Access Control & Permissions

    • Fixed incorrect access for read-only and limited-permission users.
    • Resolved unauthorized access returning 404 instead of 403.
    • Fixed group access inheritance, read-only enforcement, and access list UI issues.
    • Fixed global admin and tenant admin visibility inconsistencies.
    • Resolved users retaining access after permissions were revoked.
  • User & Group Management

    • Fixed issues adding/removing users from groups and apps.
    • Resolved duplicate, missing, or stale users/groups in Admin and App Management views.
    • Fixed pending users appearing incorrectly in dropdowns.
    • Corrected user routing, profile navigation, and admin list behaviors.
  • API Stability & Data Integrity

    • Fixed numerous 400/401/403/404/500/504 API errors across records, modules, and imports.
    • Corrected DELETE, PUT, POST, and GET inconsistencies across core endpoints.
    • Fixed service account authentication and authorization failures.
    • Resolved GraphQL queries failing under service account tokens.
    • Fixed batch create/update failures and migration-related errors.
  • UI / UX & Performance

    • Resolved stuck spinners, blank pages, and missing UI components.
    • Fixed console errors across Setup, Security Modal, Forms, and Builders.
    • Improved dropdown behavior, validation messages, and toaster notifications.
    • Fixed navigation issues, tab alignment, and missing buttons.
    • Resolved severe performance degradation during permission propagation.
  • Forms, Questionnaires & Automation

    • Fixed questionnaire creation, deletion, permissions, and instance handling.
    • Resolved Response Automation job failures and file upload issues.
    • Fixed Form Builder save, import/export, validation, and refresh problems.
    • Restored missing automation endpoints and Swagger documentation entries.

Changes

  • Architecture & Backend

    • Refactored Service Account architecture to be app-scoped and group-based.
    • Migrated RBAC logic to centralized permission evaluation and caching layers.
    • Introduced background tasks for email delivery and permission propagation.
    • Improved replica and cache consistency for users, groups, and permissions.
    • DEPRECATED ENDPOINTS (6):
      • GET /api/rbac/{intModuleId}/{intParentId}
      • GET /api/rbac/add/{intModuleId}/{intParentId}/{intGroupId}/{intPermissionType}
      • DELETE /api/rbac/{intModuleId}/{intParentId}/{intRbacId}
      • GET /api/rbac/public/{intModuleId}/{intParentId}/{isPublic}
      • GET /api/rbac/detail/{intModuleId}/{intParentId}
      • GET /api/rbac/reset/{moduleId}/{parentId}
    • NEW ENDPOINTS (3):
      • GET /api/rbac/security/{moduleId}/{parentId} - Get security modal data
      • POST /api/rbac/security - Save security settings
      • GET /api/rbac/groups/{moduleId}
  • App & Module Behavior

    • Changed record security inheritance terminology and behavior for clarity.
    • Improved module reset, factory reset, and upgrade migration reliability.
    • Updated module configuration storage and consolidation logic.
    • Improved enforcement of module visibility based on permissions.
  • Admin & Setup Experience

    • Reorganized App Setup and Management UI for clarity and consistency.
    • Improved validation, error handling, and feedback during app creation.
    • Updated admin tables, labels, and navigation behavior.
    • Improved auditability and logging while limiting sensitive console output.