<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Powerpipe Changelog</title>
        <link>https://powerpipe.io/changelog</link>
        <description>Changelog for Powerpipe</description>
        <language>en</language>
        <lastBuildDate>Fri, 27 Feb 2026 10:00:00 GMT</lastBuildDate>
        <atom:link href="https://powerpipe.io/changelog/feed.xml" rel="self" type="application/rss+xml"/>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-5-0</guid>
            <title>Powerpipe CLI v1.5.0 - Go 1.26 upgrade and dependency updates</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-5-0</link>
            <description>_What&apos;s new_
- Compiled with Go 1.26.

_Dependencies_
- Upgrade go and npm dependencies to remediate security vulnerabilities.</description>
            <pubDate>Fri, 27 Feb 2026 10:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-4-4</guid>
            <title>Powerpipe CLI v1.4.4 - Dependency upgrades for security</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-4-4</link>
            <description>_Dependencies_
- Upgrade go and npm dependencies to remediate security vulnerabilities.</description>
            <pubDate>Fri, 20 Feb 2026 10:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-4-3</guid>
            <title>Powerpipe CLI v1.4.3 - Dependency upgrades for security</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-4-3</link>
            <description>_Dependencies_
- Upgrade go and npm dependencies to remediate vulnerabilities.</description>
            <pubDate>Thu, 12 Feb 2026 10:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-5-0</guid>
            <title>Azure Compliance mod v2.5.0 - Added ad_user_mfa_enabled, monitor_diagnostic_settings_exists_for_subscription, storage_account_access_keys_periodically_regenerated controls</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-5-0</link>
            <description>_Dependencies_

- Azure plugin `v1.12.0` or higher is now required. ([#359](https://github.com/turbot/steampipe-mod-azure-compliance/pull/359))

_Enhancements_

- Added new automated query implementations for the following `Azure CIS v5.0.0` controls: ([#359](https://github.com/turbot/steampipe-mod-azure-compliance/pull/359))
  - `cis_v500_5_1_2` - Ensure that `multifactor authentication` is `enabled` for all users
  - `cis_v500_6_1_1_1` - Ensure that a `Diagnostic Setting` exists for Subscription Activity Logs
  - `cis_v500_9_3_1_2` - Ensure that Storage Account access keys are periodically regenerated
- Added the following controls to `All Azure Compliance Controls` benchmark: ([#359](https://github.com/turbot/steampipe-mod-azure-compliance/pull/359))
  - `ad_user_mfa_enabled`
  - `monitor_diagnostic_settings_exists_for_subscription`
  - `storage_account_access_keys_periodically_regenerated`

_Bug fixes_

- Fixed `storage_account_access_keys_periodically_regenerated` query to correctly handle storage accounts without access keys. ([#362](https://github.com/turbot/steampipe-mod-azure-compliance/pull/362))
- Fixed `storage_account_file_share_soft_delete_enabled` query to handle `null` values correctly. ([#360](https://github.com/turbot/steampipe-mod-azure-compliance/pull/360)) (Thanks [@KingBrewer](https://github.com/KingBrewer) for the contribution!)</description>
            <pubDate>Tue, 03 Feb 2026 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-13-0</guid>
            <title>AWS Compliance mod v1.13.0 - Added six new AWS Foundational Security Best Practices controls</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-13-0</link>
            <description>_Enhancements_

- Added six new AWS Foundational Security Best Practices (FSBP) controls: ([#961](https://github.com/turbot/steampipe-mod-aws-compliance/pull/961))
  - `foundational_security_cognito_3`: Password policies for Cognito user pools should have strong configurations
  - `foundational_security_dms_13`: DMS replication instances should be configured to use multiple Availability Zones
  - `foundational_security_ec2_181`: EC2 launch templates should enable encryption for attached EBS volumes
  - `foundational_security_rds_43`: RDS DB proxies should require TLS encryption for connections
  - `foundational_security_rds_47`: RDS for PostgreSQL DB clusters should be configured to copy tags to DB snapshots
  - `foundational_security_rds_48`: RDS for MySQL DB clusters should be configured to copy tags to DB snapshots</description>
            <pubDate>Fri, 05 Dec 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-microsoft365-compliance-mod-v1-4-0</guid>
            <title>Microsoft 365 Compliance mod v1.4.0 - Added Microsoft 365 CIS v6.0.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-microsoft365-compliance-mod-v1-4-0</link>
            <description>_Dependencies_

- AzureAD plugin `v1.9.0` or higher is now required. ([#84](https://github.com/turbot/steampipe-mod-microsoft365-compliance/pull/84))

_What&apos;s new?_

- Added Microsoft 365 CIS v6.0.0 benchmark (`powerpipe benchmark run microsoft365_compliance.benchmark.cis_v600`). ([#84](https://github.com/turbot/steampipe-mod-microsoft365-compliance/pull/84))</description>
            <pubDate>Tue, 02 Dec 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-alicloud-compliance-mod-v1-1-0</guid>
            <title>Alibaba Cloud Compliance mod v1.1.0 - Added Alibaba Cloud CIS v2.0.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-alicloud-compliance-mod-v1-1-0</link>
            <description>_Dependencies_

- Alicloud plugin `v1.5.0` or higher is now required. ([#70](https://github.com/turbot/steampipe-mod-alicloud-compliance/pull/70))

_What&apos;s new?_

- Added Alibaba Cloud CIS v2.0.0 benchmark (`powerpipe benchmark run alicloud_compliance.benchmark.cis_v200`). ([#70](https://github.com/turbot/steampipe-mod-alicloud-compliance/pull/70))</description>
            <pubDate>Tue, 25 Nov 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-4-0</guid>
            <title>Azure Compliance mod v2.4.0 - Added databricks_workspace_public_network_access_disabled, databricks_workspace_uses_private_endpoint, iam_subscription_tenant_transfer_restricted controls</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-4-0</link>
            <description>_Dependencies_

- Azure plugin `v1.11.0` or higher is now required. ([#351](https://github.com/turbot/steampipe-mod-azure-compliance/pull/351))

_Enhancements_

- Added new automated query implementations for the following `CIS v5.0.0` controls: ([#351](https://github.com/turbot/steampipe-mod-azure-compliance/pull/351))
  - `cis_v500_2_1_10` - Ensure &apos;Allow Public Network Access&apos; is set to &apos;Disabled&apos; for Databricks workspaces
  - `cis_v500_2_1_11` - Ensure private endpoints are used to access Azure Databricks workspaces
  - `cis_v500_5_25` - Ensure that &apos;Subscription leaving Microsoft Entra tenant&apos; and &apos;Subscription entering Microsoft Entra tenant&apos; is set to &apos;Permit no one&apos;

- Added the following controls to `All Azure Compliance Controls` benchmark: ([#351](https://github.com/turbot/steampipe-mod-azure-compliance/pull/351))
  - `databricks_workspace_public_network_access_disabled`
  - `databricks_workspace_uses_private_endpoint`
  - `iam_subscription_tenant_transfer_restricted`

_Bug fixes_

- Fixed `securitycenter_security_alerts_to_owner_enabled` query to correctly check `notifications_by_role` column for Owner role instead of `alerts_to_admins` column. ([#352](https://github.com/turbot/steampipe-mod-azure-compliance/pull/352)) (Thanks [@KingBrewer](https://github.com/KingBrewer) for the contribution!)</description>
            <pubDate>Mon, 24 Nov 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-12-0</guid>
            <title>AWS Compliance mod v1.12.0 - Fixed the athena_workgroup_encryption_at_rest_enabled query to remove false alarms</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-12-0</link>
            <description>_Dependencies_

- AWS plugin `v1.28.0` or higher is now required. ([#955](https://github.com/turbot/steampipe-mod-aws-compliance/pull/955))

_Bug fixes_

- Fixed the `athena_workgroup_encryption_at_rest_enabled` query to remove false alarms. ([#955](https://github.com/turbot/steampipe-mod-aws-compliance/pull/955))</description>
            <pubDate>Mon, 24 Nov 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-4-2</guid>
            <title>Powerpipe CLI v1.4.2 - Minor dashboard UI fixes and dependency upgrades for security</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-4-2</link>
            <description>_Bug Fixes_
- Fix issue where cell controls were not appearing after scrolling. ([#956](https://github.com/turbot/powerpipe/issues/956))
- Align dashboard UI tag filters behaviour with CLI. ([#969](https://github.com/turbot/powerpipe/issues/969))

_Dependencies_
- Upgrade `containerd`, `webpack-dev-server`, `js-yaml`, `glob` packages to remediate vulnerabilities.</description>
            <pubDate>Fri, 21 Nov 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-11-0</guid>
            <title>AWS Compliance mod v1.11.0 - Added iam_custom_managed_policy_attached_to_role and iam_custom_policy_unused controls</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-11-0</link>
            <description>_Enhancements_

- Added `iam_custom_managed_policy_attached_to_role` and `iam_custom_policy_unused` controls to exclude AWS managed policies from compliance checks, reducing report noise. ([#957](https://github.com/turbot/steampipe-mod-aws-compliance/pull/957))

_Bug fixes_

- Fixed the `s3_bucket_policy_restrict_public_access` query to prevent false positives for S3 bucket policies with `Principal:*` restricted via AWS Organization conditions (`aws:PrincipalOrgID`) or specific AWS accounts. ([#954](https://github.com/turbot/steampipe-mod-aws-compliance/pull/954))</description>
            <pubDate>Wed, 19 Nov 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-3-1</guid>
            <title>Azure Compliance mod v2.3.1 - Fixed false positives in compute_vm_remote_access_restricted_all_ports and compute_vm_remote_access_restricted queries</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-3-1</link>
            <description>_Bug fixes_

- Fixed false positives in `compute_vm_remote_access_restricted_all_ports` and `compute_vm_remote_access_restricted` queries. ([#348](https://github.com/turbot/steampipe-mod-azure-compliance/pull/348))

- Fixed typo in `network_virtual_network_watcher_flow_log_retention_90_days` query. ([#349](https://github.com/turbot/steampipe-mod-azure-compliance/pull/349)) (Thanks [@KingBrewer](https://github.com/KingBrewer) for the contribution!)</description>
            <pubDate>Wed, 19 Nov 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-oci-compliance-mod-v1-1-0</guid>
            <title>OCI Compliance mod v1.1.0 - Added OCI CIS v3.0.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-oci-compliance-mod-v1-1-0</link>
            <description>_What&apos;s new?_

- Added OCI CIS v3.0.0 benchmark (`powerpipe benchmark run oci_compliance.benchmark.cis_v300`). ([#98](https://github.com/turbot/steampipe-mod-oci-compliance/pull/98))

_Enhancements_

- Updated all top-level benchmark titles to include `OCI` for clearer cloud provider identification. ([#96](https://github.com/turbot/steampipe-mod-oci-compliance/pull/96))</description>
            <pubDate>Fri, 14 Nov 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-10-1</guid>
            <title>AWS Compliance mod v1.10.1 - Fixed syntax error in guardduty_detector_lambda_protection_enabled query</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-10-1</link>
            <description>_Bug fixes_

- Fixed syntax error in `guardduty_detector_lambda_protection_enabled` query. ([#949](https://github.com/turbot/steampipe-mod-aws-compliance/pull/949))
- Fixed typos in several CIS docs. ([#950](https://github.com/turbot/steampipe-mod-aws-compliance/pull/950))</description>
            <pubDate>Mon, 03 Nov 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-3-0</guid>
            <title>Azure Compliance mod v2.3.0 - Added CIS v5.0.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-3-0</link>
            <description>_Dependencies_

- AzureAD plugin v1.8.0 or higher is now required. ([#344](https://github.com/turbot/steampipe-mod-azure-compliance/pull/344))

_What&apos;s new?_

- Added Azure CIS v5.0.0 benchmark (`powerpipe benchmark run azure_compliance.benchmark.cis_v500`). ([#344](https://github.com/turbot/steampipe-mod-azure-compliance/pull/344))</description>
            <pubDate>Fri, 24 Oct 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-microsoft365-compliance-mod-v1-3-0</guid>
            <title>Microsoft 365 Compliance mod v1.3.0 - Added CIS v5.0.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-microsoft365-compliance-mod-v1-3-0</link>
            <description>_What&apos;s new?_

- Added CIS v5.0.0 benchmark (`powerpipe benchmark run microsoft365_compliance.benchmark.cis_v500`). ([#81](https://github.com/turbot/steampipe-mod-microsoft365-compliance/pull/81))

_Enhancements_

- Updated all top-level benchmark titles to include `Microsoft 365` for clearer identification and consistency across benchmarks. ([#80](https://github.com/turbot/steampipe-mod-microsoft365-compliance/pull/80))</description>
            <pubDate>Wed, 22 Oct 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-10-0</guid>
            <title>AWS Compliance mod v1.10.0 - Added CIS v6.0.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-10-0</link>
            <description>_What&apos;s new?_

- Added CIS v6.0.0 benchmark (`powerpipe benchmark run aws_compliance.benchmark.cis_v600`). ([#941](https://github.com/turbot/steampipe-mod-aws-compliance/pull/941))

_Bug fixes_

- Fixed the `foundational_security_redshift_4` control to correctly reference `redshift_cluster_audit_logging_enabled` query instead of `redshift_cluster_automatic_snapshots_min_7_days`. ([#945](https://github.com/turbot/steampipe-mod-aws-compliance/pull/945))</description>
            <pubDate>Wed, 08 Oct 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-4-1</guid>
            <title>Powerpipe CLI v1.4.1 - Restored CentOS/RHEL 9 compatibility and other dashboard UI fixes</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-4-1</link>
            <description>_Bug Fixes_

- Build: Restored CentOS/RHEL 9 compatibility by pinning the build image to an older libstdc++/GCC baseline. Previous build linked against newer GLIBCXX symbols, causing Powerpipe to fail on CentOS/RHEL 9.
- Improve benchmark/detection summary chart width calculations. ([#945](https://github.com/turbot/powerpipe/issues/945))
- Fix filtering by false boolean values in tables. ([#946](https://github.com/turbot/powerpipe/issues/946))</description>
            <pubDate>Tue, 07 Oct 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-9-2</guid>
            <title>AWS Compliance mod v1.9.2 - Re-added control elb_application_lb_drop_http_headers to avoid breaking dependencies in other mods</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-9-2</link>
            <description>_Bug fixes_

- Re-added control `elb_application_lb_drop_http_headers` to avoid breaking dependencies in other mods. ([#943](https://github.com/turbot/steampipe-mod-aws-compliance/pull/943))</description>
            <pubDate>Thu, 02 Oct 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-github-security-log-detections-mod-v0-1-0</guid>
            <title>GitHub Security Log Detections mod v0.1.0 - Added Security Log Detections and MITRE ATT&amp;CK v16.1 benchmarks</title>
            <link>https://powerpipe.io/changelog/turbot-github-security-log-detections-mod-v0-1-0</link>
            <description>_What&apos;s new?_

- New benchmarks added:
  - GitHub Security Log Detections benchmark (`powerpipe benchmark run github_security_log_detections.benchmark.security_log_detections`).
  - MITRE ATT&amp;CK v16.1 benchmark (`powerpipe benchmark run github_security_log_detections.benchmark.mitre_attack_v161`).

- New dashboards added:
  - [GitHub Security Log Activity Dashboard](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-github-security-log-detections/dashboards/dashboard.activity_dashboard)</description>
            <pubDate>Thu, 25 Sep 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v1-3-1</guid>
            <title>GCP Compliance mod v1.3.1 - Fixed the invalid query reference in the `cis_v400_8_1` control</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v1-3-1</link>
            <description>_Bug fixes_

- Fixed the `cis_v400_8_1` control to correctly reference the `dataproc_cluster_encryption_with_cmek` query instead of `bigquery_dataset_not_publicly_accessible`. ([#218](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/218))</description>
            <pubDate>Thu, 25 Sep 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-2-0</guid>
            <title>Azure Compliance mod v2.2.0 - Updated the kubernetes_cluster_sku_standard query to report clusters using the Free SKU tier as alarm</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-2-0</link>
            <description>_Dependencies_

- Azure plugin v1.8.0 or higher is now required.

_Enhancements_

- Updated the `kubernetes_cluster_sku_standard` query to report clusters using the `Free` SKU tier as `alarm`, ensuring consistency with the API response. ([#340](https://github.com/turbot/steampipe-mod-azure-compliance/pull/340))</description>
            <pubDate>Thu, 25 Sep 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-9-1</guid>
            <title>AWS Compliance mod v1.9.1 - Fixed the invalid query reference in the iam_policy_no_full_access_to_kms control</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-9-1</link>
            <description>_Bug fixes_

- Fixed control and query name by renaming `elb_application_lb_drop_http_headers` to `elb_application_lb_http_drop_invalid_header_enabled` to correctly indicate that it checks whether Application Load Balancers are configured to drop invalid HTTP headers (not all headers). ([#936](https://github.com/turbot/steampipe-mod-aws-compliance/pull/936))
- Fixed the `iam_policy_no_full_access_to_kms` control to correctly reference `iam_policy_no_full_access_to_kms` query instead of `iam_policy_no_full_access_to_cloudtrail`. ([#938](https://github.com/turbot/steampipe-mod-aws-compliance/pull/938))</description>
            <pubDate>Thu, 25 Sep 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-4-0</guid>
            <title>Powerpipe CLI v1.4.0 - Update the tailpipe connection to support the new Tailpipe v0.7.0 DuckLake backend.</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-4-0</link>
            <description>_What&apos;s new_
- Updated the `tailpipe` connection to support the new Tailpipe v0.7.0 DuckLake backend. ([#889](https://github.com/turbot/powerpipe/issues/889))  
  **Note:** When using Powerpipe with Tailpipe v0.7.0, existing Tailpipe data must be migrated to DuckLake **before** running a dashboard that uses a Tailpipe backend. Data can be migrated by running `tailpipe query`.

- Updated pipe-fittings to v2.7.0. ([#760](https://github.com/turbot/pipe-fittings/issues/760))

**Note:** For CentOS/RHEL users, the minimum supported version is now **CentOS Stream 10 / RHEL 10** due to `libstdc++` library compatibility.</description>
            <pubDate>Mon, 22 Sep 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/tailpipe-mod-gcp-cloud-billing-insights-mod-v0-1-0</guid>
            <title>GCP Cloud Billing Insights mod v0.1.0 - Initial release</title>
            <link>https://powerpipe.io/changelog/tailpipe-mod-gcp-cloud-billing-insights-mod-v0-1-0</link>
            <description>_What&apos;s new?_

- New dashboards added: ([#2](https://github.com/turbot/tailpipe-mod-gcp-cloud-billing-insights/pull/2))
  - [GCP Cloud Billing: Cost by Label](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-gcp-cloud-billing-insights/dashboards/dashboard.cloud_billing_report_cost_by_label_dashboard)
  - [GCP Cloud Billing: Cost by Location](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-gcp-cloud-billing-insights/dashboards/dashboard.cloud_billing_report_cost_by_location_dashboard)
  - [GCP Cloud Billing: Cost by Project](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-gcp-cloud-billing-insights/dashboards/dashboard.cloud_billing_report_cost_by_project_dashboard)
  - [GCP Cloud Billing: Cost by Service](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-gcp-cloud-billing-insights/dashboards/dashboard.cloud_billing_report_cost_by_service_dashboard)
  - [GCP Cloud Billing: Overview Dashboard](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-gcp-cloud-billing-insights/dashboards/dashboard.cloud_billing_report_overview_dashboard)</description>
            <pubDate>Fri, 19 Sep 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-1-1</guid>
            <title>Azure Compliance mod v2.1.1 - Fixed queries to use LEFT JOIN instead of INNER JOIN to ensure results are returned correctly</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-1-1</link>
            <description>- Fixed queries to use `LEFT JOIN` instead of `INNER JOIN` to ensure results are returned correctly. ([#338](https://github.com/turbot/steampipe-mod-azure-compliance/pull/338))</description>
            <pubDate>Fri, 19 Sep 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-kubernetes-compliance-mod-v1-1-0</guid>
            <title>Kubernetes Compliance mod v1.1.0 - Fixed the title of pod_volume_host_path control</title>
            <link>https://powerpipe.io/changelog/turbot-kubernetes-compliance-mod-v1-1-0</link>
            <description>_Enhancements_

- Updated all top-level benchmark titles to include `Kubernetes` for clearer cloud provider identification. ([#98](https://github.com/turbot/steampipe-mod-kubernetes-compliance/pull/98))

_Bug fixes_

- Fixed the title of `pod_volume_host_path` control to correctly use `Pod containers should not mount hostPath volumes`. ([#100](https://github.com/turbot/steampipe-mod-kubernetes-compliance/pull/100))</description>
            <pubDate>Thu, 04 Sep 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-9-0</guid>
            <title>AWS Compliance mod v1.9.0 - Added 42 new controls to the AWS Foundational Security Best Practices benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-9-0</link>
            <description>_Dependencies_

- AWS plugin `v1.23.0` or higher is now required. ([#932](https://github.com/turbot/steampipe-mod-aws-compliance/pull/932))

_Enhancements_

- Added 42 new controls to the `AWS Foundational Security Best Practices` benchmark, expanding coverage across multiple AWS services, including **DocumentDB**, **EC2**, **EFS**, **ELB**, **EMR**, **Glue**, **GuardDuty**, **Inspector**, **MQ**, **MSK**, **NetworkFirewall**, **Redshift**, **S3**, **SageMaker**, **Service Catalog**, **SSM**, and **Transfer**. ([#932](https://github.com/turbot/steampipe-mod-aws-compliance/pull/932))</description>
            <pubDate>Mon, 01 Sep 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v1-3-0</guid>
            <title>GCP Compliance mod v1.3.0 - Fixed compute_instance_oslogin_enabled and project_oslogin_enabled queries to correctly handle case-sensitive columns to ensure accurate compliance results</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v1-3-0</link>
            <description>_Enhancements_

- Updated all top-level benchmark titles to include `GCP` for clearer cloud provider identification. ([#211](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/211))

_Bug fixes_

- Fixed `compute_instance_oslogin_enabled` and `project_oslogin_enabled` queries to correctly handle case-sensitive columns to ensure accurate compliance results. ([#214](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/214))</description>
            <pubDate>Fri, 29 Aug 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-3-1</guid>
            <title>Powerpipe CLI v1.3.1 - Bug fixes for database handling, config resolution, chart rendering, and dependency upgrades for security.</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-3-1</link>
            <description>_Bug Fixes_
- Fix issue where the `database` argument from a query resource was not respected. ([#829](https://github.com/turbot/powerpipe/issues/829))
- Fix issue where the default config path was not resolved correctly. The default is the `mod-location`, followed by the `$POWERPIPE_INSTALL_DIR/config`. Also the `POWERPIPE_CONFIG_PATH` environment variable was not respected. ([#898](https://github.com/turbot/powerpipe/issues/898))
- Fix issue where `pie/donut` charts were not rendering correctly on boolean values. ([#433](https://github.com/turbot/powerpipe/issues/433))

_Dependencies_
- Upgrade `hashicorp/go-getter`, `sha.js` and `cipher-base` to remediate critical and high vulnerabilities.</description>
            <pubDate>Mon, 25 Aug 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-googleworkspace-compliance-mod-v0-1</guid>
            <title>Google Workspace Compliance mod v0.1 - Removed the unsupported database variable from the mod</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-googleworkspace-compliance-mod-v0-1</link>
            <description>_Bug fixes_

- Removed the unsupported `database` variable from the mod to ensure compatibility with [Pipes](https://turbot.com/pipes). ([#8](https://github.com/turbot/steampipe-mod-googleworkspace-compliance/pull/8))</description>
            <pubDate>Fri, 22 Aug 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-8-0</guid>
            <title>AWS Compliance mod v1.8.0 - Added 47 new controls to the AWS Foundational Security Best Practices benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-8-0</link>
            <description>_Dependencies_

- AWS plugin `v1.22.0` or higher is now required. ([#930](https://github.com/turbot/steampipe-mod-aws-compliance/pull/930))

_Enhancements_

- Added 47 new controls to the `AWS Foundational Security Best Practices` benchmark, expanding coverage across multiple AWS services, including **AppSync**, **Athena**, **CodeBuild**, **Cognito**, **Data Firehose**, **DataSync**, **DMS**, **EC2**, **EFS**, **FSx**, **RDS**, **Kinesis**, **KMS**, **Redshift Serverless**, **SQS**, **SNS**, **Transfer**, **WorkSpaces**, **SageMaker**, and **DynamoDB**. ([#930](https://github.com/turbot/steampipe-mod-aws-compliance/pull/930))</description>
            <pubDate>Thu, 21 Aug 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-7-0</guid>
            <title>AWS Compliance mod v1.7.0 - Added ec2_instance_using_iam_instance_role and iam_root_user_account_console_access_mfa_enabled queries to the All AWS Compliance Controls benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-7-0</link>
            <description>_Enhancements_

- Updated all top-level benchmark titles to include `AWS` for clearer cloud provider identification. ([#924](https://github.com/turbot/steampipe-mod-aws-compliance/pull/924))
- Added `database` variable to configure the Steampipe database connection string, defaulting to `connection.steampipe.default`. ([#926](https://github.com/turbot/steampipe-mod-aws-compliance/pull/926))
- Added new automated query implementations for the following CIS controls: ([#927](https://github.com/turbot/steampipe-mod-aws-compliance/pull/927))
  - `cis_v120_1_19`
  - `cis_v130_1_18`
  - `cis_v140_1_18`
  - `cis_v150_1_18`
  - `cis_v200_1_18`
  - `cis_v300_1_18`
  - `cis_v400_1_18`
  - `cis_v500_1_17`
- Added `ec2_instance_using_iam_instance_role` and `iam_root_user_account_console_access_mfa_enabled` queries to the `All AWS Compliance Controls` benchmark. ([#927](https://github.com/turbot/steampipe-mod-aws-compliance/pull/927))</description>
            <pubDate>Wed, 13 Aug 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-1-0</guid>
            <title>Azure Compliance mod v2.1.0 - Added new Databricks, Key vault, Network and Storage Account controls to the All Azure Compliance Controls benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-1-0</link>
            <description>_Dependencies_

- Azure plugin v1.6.0 or higher is now required.

_Enhancements_

- Added the following controls to `All Azure Compliance Controls`: ([#328](https://github.com/turbot/steampipe-mod-azure-compliance/pull/328))
  - `databricks_workspace_diagnostic_log_delivery_configured`
  - `databricks_workspace_subnet_with_nsg_configured`
  - `keyvault_key_automatic_rotation_enabled`
  - `network_security_group_https_port_80_443_access_restricted`
  - `storage_account_blob_and_container_soft_delete_enabled`
  - `storage_account_file_share_smb_channel_encryption_aes_256_gcm`
  - `storage_account_file_share_smb_protocol_version_3_1_1`
- Added new automated query implementations for the following CIS controls: ([#328](https://github.com/turbot/steampipe-mod-azure-compliance/pull/328))
  - `cis_v400_10_1_2`
  - `cis_v400_10_1_3`
  - `cis_v400_3_1_7`
  - `cis_v400_6_2_1`
  - `cis_v400_7_1_1_7`
  - `cis_v400_9_3_9`
- Updated all top-level benchmark titles to include `Azure` for clearer cloud provider identification. ([#334](https://github.com/turbot/steampipe-mod-azure-compliance/pull/334))

_Bug fixes_

- Fixed several CIS controls to use the correct Azure service tags. ([#328](https://github.com/turbot/steampipe-mod-azure-compliance/pull/328))</description>
            <pubDate>Mon, 11 Aug 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-0-1</guid>
            <title>Azure Compliance mod v2.0.1 - Fixed the compliance queries to prevent ambiguous tag column references</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-0-1</link>
            <description>_Bug fixes_

- Fixed the compliance queries to prevent ambiguous `tag` column references when joining multiple Azure tables. ([#330](https://github.com/turbot/steampipe-mod-azure-compliance/pull/330))</description>
            <pubDate>Wed, 06 Aug 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-3-0</guid>
            <title>Powerpipe CLI v1.3.0 - Built with Go 1.24, fixed JSON path filtering and export error handling, and updated dependencies to address critical vulnerabilities.</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-3-0</link>
            <description>_Whats new_
- Compiled with Go 1.24.

_Bug Fixes_
- Fix issue where the `--where` arg was not correctly filtering the benchmarks/controls when JSON path expressions were passed. ([#740](https://github.com/turbot/powerpipe/issues/740))
- Fix error handling for JSON output/export incase of database failures. ([#665](https://github.com/turbot/powerpipe/issues/665))

_Dependencies_
- Upgrade `form-data` and `go-viper/mapstructure/v2` packages to remediate critical and high vulnerabilities.</description>
            <pubDate>Tue, 05 Aug 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-0-0</guid>
            <title>Azure Compliance mod v2.0.0 - Added appservice_web_app_diagnostic_log_category_http_log_enabled and storage_account_key_rotation_reminder_enabled controls to the All Controls benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v2-0-0</link>
            <description>_Breaking changes_

- Renamed the following controls to align with their focus on classic logging for the respective service types: ([#322](https://github.com/turbot/steampipe-mod-azure-compliance/pull/322))
  - `storage_account_blobs_logging_enabled` to `storage_account_blob_service_classic_logging_enabled`
  - `storage_account_queues_logging_enabled` to `storage_account_queue_service_classic_logging_enabled`
  - `storage_account_tables_logging_enabled` to `storage_account_table_service_classic_logging_enabled`

_Dependencies_

- Azure plugin `v1.5.1` or higher is now required.

_Enhancements_

- Added new automated queries for the following CIS controls: ([#323](https://github.com/turbot/steampipe-mod-azure-compliance/pull/323))
  - `cis_v150_3_3`
  - `cis_v200_3_3`
  - `cis_v200_5_1_7`
  - `cis_v210_5_1_6`
  - `cis_v300_4_3`
  - `cis_v300_6_1_6`
  - `cis_v400_10_3_1_1`
  - `cis_v400_7_1_1_6`
- Added `appservice_web_app_diagnostic_log_category_http_log_enabled` and `storage_account_key_rotation_reminder_enabled` controls to the `All Controls` benchmark. ([#323](https://github.com/turbot/steampipe-mod-azure-compliance/pull/323))

_Bug fixes_

- Fixed `keyvault_logging_enabled` query to correctly verify logging for Azure Key Vaults. ([#320](https://github.com/turbot/steampipe-mod-azure-compliance/pull/320))</description>
            <pubDate>Mon, 04 Aug 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v1-5-0</guid>
            <title>Azure Compliance mod v1.5.0 - Added compute_vm_trust_launch_enabled and iam_conditional_access_trusted_location_configured controls to the All Controls benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v1-5-0</link>
            <description>_Enhancements_

- Added new automated queries for the following manual CIS controls: ([#317](https://github.com/turbot/steampipe-mod-azure-compliance/pull/317))
  - `cis_v150_1_2_1`
  - `cis_v200_1_2_1`
  - `cis_v200_5_1_7`
  - `cis_v210_1_2_1`
  - `cis_v210_5_1_6`
  - `cis_v210_7_9`
  - `cis_v300_2_2_1`
  - `cis_v300_4_16`
  - `cis_v300_6_1_6`
  - `cis_v300_8_11`
- Added `compute_vm_trust_launch_enabled` and `iam_conditional_access_trusted_location_configured` controls to the `All Controls` benchmark. ([#317](https://github.com/turbot/steampipe-mod-azure-compliance/pull/317))
- Added variable support for App Service controls to improve configurability: ([#317](https://github.com/turbot/steampipe-mod-azure-compliance/pull/317))
  - `appservice_web_app_latest_python_version` - Configurable Python version validation for web app
  - `appservice_web_app_latest_java_version` - Configurable Java version validation for web app
  - `appservice_function_app_latest_python_version` - Configurable Python version validation for function app
  - `appservice_function_app_latest_java_version` - Configurable Java version validation for function app

_Bug fixes_

- Fixed `iam_global_administrator_max_5` query to correctly check for a minimum of 2 and a maximum of 5 administrators. ([#318](https://github.com/turbot/steampipe-mod-azure-compliance/pull/318))
- Fixed `cis_v300_3_1_4_2` control by removing the invalid query reference and marking it as manual. ([#317](https://github.com/turbot/steampipe-mod-azure-compliance/pull/317))
- Fixed `appservice_function_app_latest_java_version` query to correctly check results for both Linux and Windows operating system function app. ([#317](https://github.com/turbot/steampipe-mod-azure-compliance/pull/317))
- Fixed `appservice_web_app_latest_java_version` query to correctly check results for both Linux and Windows operating system web app. ([#317](https://github.com/turbot/steampipe-mod-azure-compliance/pull/317))</description>
            <pubDate>Thu, 31 Jul 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-6-2</guid>
            <title>AWS Compliance mod v1.6.2 - Fixed the iam_user_access_key_age_90 query to skip the inactive access keys</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-6-2</link>
            <description>_Bug fixes_

- Fixed the `account_alternate_contact_security_registered` query to correctly list all the available accounts. ([#917](https://github.com/turbot/steampipe-mod-aws-compliance/pull/917))
- Fixed the `iam_user_access_key_age_90` query to skip the inactive access keys. ([#912](https://github.com/turbot/steampipe-mod-aws-compliance/pull/912))
- Fixed `config_enabled_all_regions`, `iam_access_analyzer_enabled_without_findings` and `securityhub_enabled` queries to skip regions not defined in the `aws.spc` file. ([#908](https://github.com/turbot/steampipe-mod-aws-compliance/pull/908))</description>
            <pubDate>Thu, 24 Jul 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-2-8</guid>
            <title>Powerpipe CLI v1.2.8 - Resolved issues with detection execution and default token resolution, along with critical security updates</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-2-8</link>
            <description>_Bug Fixes_
- Fix regression where powerpipe was failing to run detections from dependant mods if steampipe service was not running. ([#824](https://github.com/turbot/powerpipe/issues/824))
- Fix issue where powerpipe server was failing to resolve the default pipes token. ([#818](https://github.com/turbot/powerpipe/issues/818))
- Fix issue where query run snapshot output was returning a 0 exit code even incase of query failures. ([#816](https://github.com/turbot/powerpipe/issues/816))

_Dependencies_
- Upgrade `pbkdf2` package to remediate critical vulnerabilities.</description>
            <pubDate>Thu, 10 Jul 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v1-2-0</guid>
            <title>GCP Compliance mod v1.2.0 - Added NIST Cybersecurity Framework (CSF) v2.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v1-2-0</link>
            <description>_What&apos;s new?_

- Added `NIST Cybersecurity Framework (CSF) v2.0` benchmark (`powerpipe benchmark run gcp_compliance.benchmark.nist_csf_v2`). ([#200](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/200))</description>
            <pubDate>Tue, 01 Jul 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-6-1</guid>
            <title>AWS Compliance mod v1.6.1 - Renamed the NIST CSF v2.0 benchmark to NIST Cybersecurity Framework (CSF) v2.0</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-6-1</link>
            <description>_Bug fixes_

- Renamed the `NIST CSF v2.0` benchmark to `NIST Cybersecurity Framework (CSF) v2.0`.</description>
            <pubDate>Tue, 01 Jul 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-6-0</guid>
            <title>AWS Compliance mod v1.6.0 - Added NIST CSF v2.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-6-0</link>
            <description>_What&apos;s new?_

- Added `NIST CSF v2.0` benchmark (`powerpipe benchmark run aws_compliance.benchmark.nist_csf_v2`). ([#899](https://github.com/turbot/steampipe-mod-aws-compliance/pull/899))
- Added `iam_role_cross_account_write_access_policy` control to the `all_controls_iam` benchmark. ([#900](https://github.com/turbot/steampipe-mod-aws-compliance/pull/900))</description>
            <pubDate>Tue, 01 Jul 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-perimeter-mod-v1-0-0</guid>
            <title>GCP Perimeter mod v1.0.0 - Initial release</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-perimeter-mod-v1-0-0</link>
            <description>_What&apos;s new?_

- Added IAM Policy Public Access benchmark (`powerpipe benchmark run gcp_perimeter.benchmark.iam_policy_public_access`)
- Added IAM Policy Shared Access benchmark (`powerpipe benchmark run gcp_perimeter.benchmark.iam_policy_shared_access`)
- Added Network Access benchmark (`powerpipe benchmark run gcp_perimeter.benchmark.network_access`)</description>
            <pubDate>Mon, 30 Jun 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-tailpipe-azure-cost-and-usage-insights-mod-v0-1-0</guid>
            <title>Azure Cost and Usage Insights mod v0.1.0 - Initial release</title>
            <link>https://powerpipe.io/changelog/turbot-tailpipe-azure-cost-and-usage-insights-mod-v0-1-0</link>
            <description>_What&apos;s new?_

- New dashboards added: ([#1](https://github.com/turbot/tailpipe-mod-azure-cost-and-usage-insights/pull/1))
  - [Azure Cost and Usage Actual: Cost by Resource Group](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-azure-cost-and-usage-insights/dashboards/dashboard.cost_by_resource_group_dashboard)
  - [Azure Cost and Usage Actual: Cost by Service](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-azure-cost-and-usage-insights/dashboards/dashboard.cost_by_service_dashboard)
  - [Azure Cost and Usage Actual: Cost by Subscription](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-azure-cost-and-usage-insights/dashboards/dashboard.cost_by_subscription_dashboard)
  - [Azure Cost and Usage Actual: Cost by Tag](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-azure-cost-and-usage-insights/dashboards/dashboard.cost_by_tag_dashboard)
  - [Azure Cost and Usage Actual: Overview Dashboard](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-azure-cost-and-usage-insights/dashboards/dashboard.overview_dashboard)</description>
            <pubDate>Mon, 30 Jun 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-googleworkspace-compliance-mod-v1-0-0</guid>
            <title>Google Workspace Compliance mod v1.0.0 - Initial release</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-googleworkspace-compliance-mod-v1-0-0</link>
            <description>_What&apos;s new?_

- Added CIS v1.2.0 benchmark (powerpipe benchmark run googleworkspace_compliance.benchmark.cis_v120).([#2](https://github.com/turbot/steampipe-mod-googleworkspace-compliance/pull/2))</description>
            <pubDate>Mon, 30 Jun 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-insights-mod-v1-1-0</guid>
            <title>GCP Insights mod v1.1.0 - Added initial inventory report dashboards</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-insights-mod-v1-1-0</link>
            <description>_What&apos;s new?_

- New dashboards added: ([#94](https://github.com/turbot/steampipe-mod-gcp-insights/pull/94))
  - [GCP Compute Disk Inventory Report](https://hub.steampipe.io/mods/turbot/gcp_insights/dashboards/dashboard.compute_disk_report_inventory)
  - [GCP Compute Instance Inventory Report](https://hub.steampipe.io/mods/turbot/gcp_insights/dashboards/dashboard.compute_instance_report_inventory)
  - [GCP IAM Service Account Inventory Report](https://hub.steampipe.io/mods/turbot/gcp_insights/dashboards/dashboard.iam_service_account_report_inventory)
  - [GCP KMS Key Inventory Report](https://hub.steampipe.io/mods/turbot/gcp_insights/dashboards/dashboard.kms_key_report_inventory)
  - [GCP Kubernetes Cluster Inventory Report](https://hub.steampipe.io/mods/turbot/gcp_insights/dashboards/dashboard.kubernetes_cluster_report_inventory)
  - [GCP SQL Database Instance Report Inventory](https://hub.steampipe.io/mods/turbot/gcp_insights/dashboards/dashboard.sql_database_instance_report_inventory)
  - [GCP Storage Bucket Report Inventory](https://hub.steampipe.io/mods/turbot/gcp_insights/dashboards/dashboard.storage_bucket_report_inventory)</description>
            <pubDate>Thu, 26 Jun 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-insights-mod-v1-1-0</guid>
            <title>Azure Insights mod v1.1.0 - Added initial inventory report dashboards</title>
            <link>https://powerpipe.io/changelog/turbot-azure-insights-mod-v1-1-0</link>
            <description>_What&apos;s new?_

- New dashboards added: ([#129](https://github.com/turbot/steampipe-mod-azure-insights/pull/129))
  - [Azure App Service Web App Inventory Report](https://hub.steampipe.io/mods/turbot/azure_insights/dashboards/dashboard.app_service_web_app_inventory_report)
  - [Azure Compute Disk Inventory Report](https://hub.steampipe.io/mods/turbot/azure_insights/dashboards/dashboard.compute_disk_inventory_report)
  - [Azure Compute Virtual Machine Inventory Report](https://hub.steampipe.io/mods/turbot/azure_insights/dashboards/dashboard.compute_virtual_machine_inventory_report)
  - [Azure Cosmos DB Account Inventory Report](https://hub.steampipe.io/mods/turbot/azure_insights/dashboards/dashboard.cosmosdb_account_inventory_report)
  - [Azure Key Vault Inventory Report](https://hub.steampipe.io/mods/turbot/azure_insights/dashboards/dashboard.key_vault_inventory_report)
  - [Azure Kubernetes Cluster Inventory Report](https://hub.steampipe.io/mods/turbot/azure_insights/dashboards/dashboard.kubernetes_cluster_inventory_report)
  - [Azure Network Security Group Inventory Report](https://hub.steampipe.io/mods/turbot/azure_insights/dashboards/dashboard.network_security_group_inventory_report)
  - [Azure Network Virtual Network Inventory Report](https://hub.steampipe.io/mods/turbot/azure_insights/dashboards/dashboard.network_virtual_network_inventory_report)
  - [Azure SQL Database Inventory Report](https://hub.steampipe.io/mods/turbot/azure_insights/dashboards/dashboard.sql_database_inventory_report)
  - [Azure SQL Server Inventory Report](https://hub.steampipe.io/mods/turbot/azure_insights/dashboards/dashboard.sql_server_inventory_report)
  - [Azure Storage Account Inventory Report](https://hub.steampipe.io/mods/turbot/azure_insights/dashboards/dashboard.storage_account_inventory_report)</description>
            <pubDate>Thu, 26 Jun 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-perimeter-mod-v1-0-0</guid>
            <title>Azure Perimeter mod v1.0.0 - Initial release</title>
            <link>https://powerpipe.io/changelog/turbot-azure-perimeter-mod-v1-0-0</link>
            <description>_What&apos;s new?_

- Added Network Access benchmark (`powerpipe benchmark run azure_perimeter.benchmark.network_access`) 
- Added Public Access benchmark (`powerpipe benchmark run azure_perimeter.benchmark.public_access`)</description>
            <pubDate>Fri, 20 Jun 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-insights-mod-v1-2-0</guid>
            <title>AWS Insights mod v1.2.0 - Added initial inventory report dashboards</title>
            <link>https://powerpipe.io/changelog/turbot-aws-insights-mod-v1-2-0</link>
            <description>_What&apos;s new?_

- New dashboards added: ([#363](https://github.com/turbot/steampipe-mod-aws-insights/pull/363))
  - [EC2 Instance Inventory Report](https://hub.steampipe.io/mods/turbot/aws_insights/dashboards/dashboard.ec2_instance_inventory_report)
  - [Lambda Function Inventory Report](https://hub.steampipe.io/mods/turbot/aws_insights/dashboards/dashboard.lambda_function_inventory_report)
  - [EBS Snapshot Inventory Report](https://hub.steampipe.io/mods/turbot/aws_insights/dashboards/dashboard.ebs_snapshot_inventory_report)
  - [EBS Volume Inventory Report](https://hub.steampipe.io/mods/turbot/aws_insights/dashboards/dashboard.ebs_volume_inventory_report)
  - [S3 Bucket Inventory Report](https://hub.steampipe.io/mods/turbot/aws_insights/dashboards/dashboard.s3_bucket_inventory_report)
  - [RDS DB Instance Inventory Report](https://hub.steampipe.io/mods/turbot/aws_insights/dashboards/dashboard.rds_db_instance_inventory_report)
  - [RDS DB Cluster Inventory Report](https://hub.steampipe.io/mods/turbot/aws_insights/dashboards/dashboard.rds_db_cluster_inventory_report)
  - [CloudTrail Trail Inventory Report](https://hub.steampipe.io/mods/turbot/aws_insights/dashboards/dashboard.cloudtrail_trail_inventory_report)
  - [IAM User Inventory Report](https://hub.steampipe.io/mods/turbot/aws_insights/dashboards/dashboard.iam_user_inventory_report)
  - [KMS Key Inventory Report](https://hub.steampipe.io/mods/turbot/aws_insights/dashboards/dashboard.kms_key_inventory_report)
  - [VPC Inventory Report](https://hub.steampipe.io/mods/turbot/aws_insights/dashboards/dashboard.vpc_inventory_report)</description>
            <pubDate>Fri, 20 Jun 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-thrifty-mod-v1-1-0</guid>
            <title>Azure Thrifty mod v1.1.0 - Added network_application_gateway_with_autoscaling_disabled, network_load_balancer_with_duplicate_rules, network_load_balancer_with_missing_backend, network_load_balancer_with_nonexistent_backend and network_private_endpoint_unused controls</title>
            <link>https://powerpipe.io/changelog/turbot-azure-thrifty-mod-v1-1-0</link>
            <description>_What&apos;s new?_

- New controls added: ([#52](https://github.com/turbot/steampipe-mod-azure-thrifty/pull/52))
  - `network_application_gateway_with_autoscaling_disabled`
  - `network_load_balancer_with_duplicate_rules`
  - `network_load_balancer_with_missing_backend`
  - `network_load_balancer_with_nonexistent_backend`
  - `network_private_endpoint_unused`</description>
            <pubDate>Wed, 04 Jun 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-thrifty-mod-v1-1-0</guid>
            <title>AWS Thrifty mod v1.1.0 - Added apigateway_stage_with_caching_disabled, dynamodb_table_without_autoscaling, ecr_repository_unused_images and rds_unused_snapshots controls</title>
            <link>https://powerpipe.io/changelog/turbot-aws-thrifty-mod-v1-1-0</link>
            <description>_What&apos;s new?_

- New controls added:
  - `apigateway_stage_with_caching_disabled` ([#186](https://github.com/turbot/steampipe-mod-aws-thrifty/pull/186))
  - `dynamodb_table_without_autoscaling` ([#187](https://github.com/turbot/steampipe-mod-aws-thrifty/pull/187))
  - `ecr_repository_unused_images` ([#185](https://github.com/turbot/steampipe-mod-aws-thrifty/pull/185))
  - `rds_unused_snapshots` ([#183](https://github.com/turbot/steampipe-mod-aws-thrifty/pull/183))</description>
            <pubDate>Wed, 04 Jun 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v1-1-0</guid>
            <title>GCP Compliance mod v1.1.0 - Added CIS v4.0.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v1-1-0</link>
            <description>_What&apos;s new?_

- Added CIS v4.0.0 benchmark (`powerpipe benchmark run gcp_compliance.benchmark.cis_v400`). ([#195](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/195))</description>
            <pubDate>Fri, 23 May 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-2-7</guid>
            <title>Powerpipe CLI v1.2.7 - Fix port exposure, JSON output, and Tailpipe connection parsing issues</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-2-7</link>
            <description>_Bug Fixes_

* Fix issue where powerpipe was exposing the server port to the internet even when listen was local. ([#761](https://github.com/turbot/powerpipe/issues/761))
* Fix issue where benchmark/control json output was not printing the complete JSON to stdout. ([#791](https://github.com/turbot/powerpipe/issues/791))
* Fix issue where the `from` property in Tailpipe connections was getting parsed incorrectly. ([#790](https://github.com/turbot/powerpipe/issues/790))</description>
            <pubDate>Wed, 21 May 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-5-1</guid>
            <title>AWS Compliance mod v1.5.1 - Fixed the kms_cmk_policy_prohibit_public_access, sns_topic_policy_prohibit_public_access, and sns_topic_policy_prohibit_cross_account_access queries to correctly assess whether the associated IAM policies allow public access or cross-account access</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-5-1</link>
            <description>_Bug fixes_

- Fixed the `sagemaker_notebook_instance_encryption_at_rest_enabled` query to correctly return SageMaker notebook instances with encryption at rest disabled. ([#897](https://github.com/turbot/steampipe-mod-aws-compliance/pull/897))
- Fixed a syntax error in the `iam_user_one_active_key` query. ([#895](https://github.com/turbot/steampipe-mod-aws-compliance/pull/895))
- Fixed the `lambda_function_dead_letter_queue_configured` query to properly check for Lambda functions with a DLQ (Dead Letter Queue) configured. ([#893](https://github.com/turbot/steampipe-mod-aws-compliance/pull/893))
- Fixed the `kms_cmk_policy_prohibit_public_access`, `sns_topic_policy_prohibit_public_access`, and `sns_topic_policy_prohibit_cross_account_access` queries to correctly assess whether the associated IAM policies allow public access or cross-account access. ([#858](https://github.com/turbot/steampipe-mod-aws-compliance/pull/858), [#887](https://github.com/turbot/steampipe-mod-aws-compliance/pull/887))</description>
            <pubDate>Fri, 16 May 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v1-3-1</guid>
            <title>Azure Compliance mod v1.3.1 - Fixed the ordering of sub-benchmark cis_v400_10 in the cis_v400 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v1-3-1</link>
            <description>_Bug fixes_

- Fixed the ordering of sub-benchmark `cis_v400_10` in the `cis_v400` benchmark. ([#305](https://github.com/turbot/steampipe-mod-azure-compliance/pull/305))
- Fixed an issue where sub-benchmark `nist_csf_v2_id_ra_04` was missing from the `nist_csf_v2` benchmark. ([#305](https://github.com/turbot/steampipe-mod-azure-compliance/pull/305))</description>
            <pubDate>Tue, 13 May 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v1-3-0</guid>
            <title>Azure Compliance mod v1.3.0 - Added CIS v4.0.0 and NIST CSF v2.0 benchmarks</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v1-3-0</link>
            <description>_Dependencies_

- Azure plugin `v1.4.0` or higher is now required.

_What&apos;s new?_

- Added CIS v4.0.0 benchmark (`powerpipe benchmark run azure_compliance.benchmark.cis_v400`). ([#300](https://github.com/turbot/steampipe-mod-azure-compliance/pull/300))
- Added NIST CSF v2.0 benchmark (`powerpipe benchmark run azure_compliance.benchmark.nist_csf_v2`). ([#302](https://github.com/turbot/steampipe-mod-azure-compliance/pull/302))</description>
            <pubDate>Mon, 12 May 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-2-6</guid>
            <title>Powerpipe CLI v1.2.6 - Fixed issues with detection runs, server UI, and exports</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-2-6</link>
            <description>_Bug Fixes_

* Fix issue where powerpipe was failing to run detections from dependant mods if steampipe service was not running. ([#788](https://github.com/turbot/powerpipe/issues/788))
* Fix issue where detection benchmarks were not showing date range selector in powerpipe server. ([#789](https://github.com/turbot/powerpipe/issues/789))
* Fix issue where powerpipe was failing to export detection benchmarks. ([#796](https://github.com/turbot/powerpipe/issues/796))</description>
            <pubDate>Thu, 08 May 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-5-0</guid>
            <title>AWS Compliance mod v1.5.0 - Added iam_user_access_key_age_365 and secretsmanager_secret_rotation_enabled controls to all_controls_iam and all_controls_secretsmanager benchmarks respectively</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-5-0</link>
            <description>_Dependencies_

- AWS plugin `v1.12.0` or higher is now required. ([#882](https://github.com/turbot/steampipe-mod-aws-compliance/pull/882))

_What&apos;s new?_

- Added `iam_user_access_key_age_365` and `secretsmanager_secret_rotation_enabled` controls to `all_controls_iam` and `all_controls_secretsmanager` benchmarks respectively. ([#886](https://github.com/turbot/steampipe-mod-aws-compliance/pull/886))
- Refactored GuardDuty queries to skip regions where GuardDuty is not available. ([#882](https://github.com/turbot/steampipe-mod-aws-compliance/pull/882))

_Bug fixes_

- Fixed `eks_cluster_secrets_encrypted` query to automatically return `ok` instead of an `alarm` for EKS clusters with version greater than `1.27` since they are automatically encrypted by AWS owned KMS keys. ([#883](https://github.com/turbot/steampipe-mod-aws-compliance/pull/883))</description>
            <pubDate>Wed, 07 May 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-4-0</guid>
            <title>AWS Compliance mod v1.4.0 - Added CIS v5.0.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-4-0</link>
            <description>_What&apos;s new?_

- Added CIS v5.0.0 benchmark (`powerpipe benchmark run aws_compliance.benchmark.cis_v500`). ([#881](https://github.com/turbot/steampipe-mod-aws-compliance/pull/881))
- Added `lambda_function_logging_config_enabled` control to `all_controls_lambda` benchmark.

_Bug fixes_

- Fixed `eks_cluster_secrets_encrypted` query to automatically return `ok` instead of an `alarm` for EKS clusters with version greater than `1.27` since they are automatically encrypted by AWS owned KMS keys. ([#883](https://github.com/turbot/steampipe-mod-aws-compliance/pull/883))</description>
            <pubDate>Sat, 26 Apr 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-tailpipe-aws-vpc-flow-log-detections-mod-v0-1-0</guid>
            <title>AWS VPC Flow Log Detections mod v0.1.0 - Added VPC Flow Log Detections and MITRE ATT&amp;CK v16.1 benchmarks</title>
            <link>https://powerpipe.io/changelog/turbot-tailpipe-aws-vpc-flow-log-detections-mod-v0-1-0</link>
            <description>_What&apos;s new?_

- New benchmarks added:
  - MITRE ATT&amp;CK v16.1 benchmark (`powerpipe benchmark run aws_vpc_flow_log_detections.benchmark.mitre_attack_v161`).
  - VPC Flow Log Detections benchmark (`powerpipe benchmark run aws_vpc_flow_log_detections.benchmark.vpc_flow_log_detections`).

- New dashboards added:
  - [VPC Flow Log Activity Dashboard](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-aws-vpc-flow-log-detections/dashboards/dashboard.activity_dashboard)
  - [VPC Flow Log Network Graph](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-aws-vpc-flow-log-detections/dashboards/dashboard.network_graph)</description>
            <pubDate>Fri, 18 Apr 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-tailpipe-aws-s3-server-access-log-detections-mod-v0-2-0</guid>
            <title>AWS S3 Server Access Log Detections mod v0.2.0 - Improved Activity Dashboard tables and added missing folder tags to detections</title>
            <link>https://powerpipe.io/changelog/turbot-tailpipe-aws-s3-server-access-log-detections-mod-v0-2-0</link>
            <description>_What&apos;s new?_

- Added `Top 10 Keys` table to Activity Dashboard.

_Enhancements_

- Added link for collecting S3 server access logs in **Getting Started** section in README and index documentation.

_Bug fixes_

- Added missing bucket information to `Top 10 URIs` tables in Activity Dashboard.
- Added `folder = &quot;S3&quot;` tag to detection queries.</description>
            <pubDate>Fri, 18 Apr 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/tailpipe-mcp-v0-1-0</guid>
            <title>Powerpipe MCP v0.1.0 - Initial release</title>
            <link>https://powerpipe.io/changelog/tailpipe-mcp-v0-1-0</link>
            <description>_Whats new?_

* Initial version of Tailpipe MCP server
* Build and run Powerpipe mods using AI</description>
            <pubDate>Thu, 17 Apr 2025 10:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-tailpipe-mod-nginx-access-log-detections-mod-v0-1-0</guid>
            <title>Nginx Access Log Detections mod v0.1.0 - Added Access Log Detections, MITRE ATT&amp;CK v16.1 and OWASP Top 10 2021 benchmarks</title>
            <link>https://powerpipe.io/changelog/turbot-tailpipe-mod-nginx-access-log-detections-mod-v0-1-0</link>
            <description>_What&apos;s new?_
 
 - New benchmarks added:
   - Access Log Detections benchmark (`powerpipe benchmark run nginx_access_log_detections.benchmark.access_log_detections`).
   - MITRE ATT&amp;CK v16.1 benchmark (`powerpipe benchmark run nginx_access_log_detections.benchmark.mitre_attack_v161`).
   - OWASP Top 10 2021 benchmark (`powerpipe benchmark run nginx_access_log_detections.benchmark.owasp_top_10_2021`).
 
 - New dashboards added:
   - [Access Log Activity Dashboard](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-nginx-access-log-detections/dashboards/dashboard.activity_dashboard)</description>
            <pubDate>Wed, 16 Apr 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-tailpipe-mod-aws-s3-server-access-log-detections-mod-v0-1-0</guid>
            <title>AWS S3 Server Access Log Detections mod v0.1.0 - Added S3 Server Access Log Detections and MITRE ATT&amp;CK v16.1 benchmarks</title>
            <link>https://powerpipe.io/changelog/turbot-tailpipe-mod-aws-s3-server-access-log-detections-mod-v0-1-0</link>
            <description>_What&apos;s new?_

- New benchmarks added:
  - MITRE ATT&amp;CK v16.1 benchmark (`powerpipe benchmark run aws_s3_server_access_log_detections.benchmark.mitre_attack_v161`).
  - S3 Server Access Log Detections benchmark (`powerpipe benchmark run aws_s3_server_access_log_detections.benchmark.s3_server_access_log_detections`).

- New dashboards added:
  - [S3 Server Access Log Activity Dashboard](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-aws-s3-server-access-log-detections/dashboards/dashboard.activity_dashboard)</description>
            <pubDate>Wed, 16 Apr 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-tailpipe-mod-aws-cost-and-usage-insights-mod-v0-1-0</guid>
            <title>AWS Cost and Usage Insights mod v0.1.0 - Added Cost by Account, Cost by Region, Overview dashboards</title>
            <link>https://powerpipe.io/changelog/turbot-tailpipe-mod-aws-cost-and-usage-insights-mod-v0-1-0</link>
            <description>_What&apos;s new?_

- New dashboards added:
  - [Cost and Usage Report: Cost by Account](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-aws-cost-usage-report-insights/dashboards/dashboard.cost_by_account_dashboard)
  - [Cost and Usage Report: Cost by Region](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-aws-cost-usage-report-insights/dashboards/dashboard.cost_by_region_dashboard)
  - [Cost and Usage Report: Cost by Service](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-aws-cost-usage-report-insights/dashboards/dashboard.cost_by_service_dashboard)
  - [Cost and Usage Report: Cost by Tag](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-aws-cost-usage-report-insights/dashboards/dashboard.cost_by_tag_dashboard)
  - [Cost and Usage Report: Overview Dashboard](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-aws-cost-usage-report-insights/dashboards/dashboard.overview_dashboard)</description>
            <pubDate>Wed, 16 Apr 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-tailpipe-mod-apache-access-log-detections-mod-v0-1-0</guid>
            <title>Apache Access Log Detections mod v0.1.0 - Added Access Log Detections, OWASP Top 10 2021 and MITRE ATT&amp;CK v16.1 benchmarks</title>
            <link>https://powerpipe.io/changelog/turbot-tailpipe-mod-apache-access-log-detections-mod-v0-1-0</link>
            <description>_What&apos;s new?_

- New benchmarks added:
  - Access Log Detections benchmark (`powerpipe benchmark run apache_access_log_detections.benchmark.access_log_detections`).
  - MITRE ATT&amp;CK v16.1 benchmark (`powerpipe benchmark run apache_access_log_detections.benchmark.mitre_attack_v161`).
  - OWASP Top 10 2021 benchmark (`powerpipe benchmark run apache_access_log_detections.benchmark.owasp_top_10_2021`).

- New dashboards added:
  - [Access Log Activity Dashboard](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-apache-access-log-detections/dashboards/dashboard.activity_dashboard)</description>
            <pubDate>Wed, 16 Apr 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-2-5</guid>
            <title>Powerpipe CLI v1.2.5 - Fix the table data cells displaying a vertical scroll in some browsers</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-2-5</link>
            <description>_Bug Fixes_

* Fix the table data cells displaying a vertical scroll in some browsers. ([#765](https://github.com/turbot/powerpipe/issues/765))
* Fix issue where setting custom relative duration not shown in presets does not update the relative timestamp. ([#769](https://github.com/turbot/powerpipe/issues/769))</description>
            <pubDate>Mon, 14 Apr 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-2-4</guid>
            <title>Powerpipe CLI v1.2.4 - Table headers for numeric columns are now right-aligned like the row-level cell content</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-2-4</link>
            <description>_Bug Fixes_

* Table headers for numeric columns are now right-aligned like the row-level cell content. ([#755](https://github.com/turbot/powerpipe/issues/755))</description>
            <pubDate>Fri, 04 Apr 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-2-3</guid>
            <title>Powerpipe CLI v1.2.3 - Fix the supported export formats in `powerpipe query run` command</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-2-3</link>
            <description>_Bug Fixes_
- Fix the supported export formats in `powerpipe query run` command. ([#539](https://github.com/turbot/powerpipe/issues/539))
- Ensure dashboard UI Table component fetches external link from registry when used rather than during module import. ([#720](https://github.com/turbot/powerpipe/issues/720))

_Dependencies_
- Upgrade `containerd` and `golang.org/x/net` packages to remediate moderate vulnerabilities.</description>
            <pubDate>Wed, 02 Apr 2025 10:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-github-audit-log-detections-mod-v0-1-0</guid>
            <title>GitHub Audit Log Detections mod v0.1.0 - Added Audit Log Detections and MITRE ATT&amp;CK v16.1 benchmarks</title>
            <link>https://powerpipe.io/changelog/turbot-github-audit-log-detections-mod-v0-1-0</link>
            <description>_What&apos;s new?_

- New benchmarks added:
  - Audit Log Detections benchmark (`powerpipe benchmark run github_audit_log_detections.benchmark.audit_log_detections`).
  - MITRE ATT&amp;CK v16.1 benchmark (`powerpipe benchmark run github_audit_log_detections.benchmark.mitre_attack_v161`).

- New dashboards added:
  - [Audit Log Activity Dashboard](https://hub.powerpipe.io/mods/turbot/tailpipe-mod-github-audit-log-detections/dashboards/dashboard.activity_dashboard)</description>
            <pubDate>Tue, 25 Mar 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-3-0</guid>
            <title>AWS Compliance mod v1.3.0 - Added PCI DSS v4.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-3-0</link>
            <description>_What&apos;s new?_

- Added PCI DSS v4.0 benchmark (`powerpipe benchmark run aws_compliance.benchmark.pci_dss_v40`). ([#871](https://github.com/turbot/steampipe-mod-aws-compliance/pull/871))

_Bug fixes_

- Fixed the `iam_user_one_active_key` query to correctly evaluate IAM access keys across multiple AWS accounts. ([#867](https://github.com/turbot/steampipe-mod-aws-compliance/pull/867)) (Thanks [@adrianstanislaus](https://github.com/adrianstanislaus) for the contribution!!)</description>
            <pubDate>Fri, 21 Mar 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-tailpipe-detections-mods-v0-3-0</guid>
            <title>Tailpipe Detections Mods v0.3.0 - Improved query categorization and consistency for dashboards and detections for AWS CloudTrail Log, Azure Activity Log and GCP Audit Log Detections mods</title>
            <link>https://powerpipe.io/changelog/turbot-tailpipe-detections-mods-v0-3-0</link>
            <description>_Enhancements_

- Added `title`, `description`, and `folder` tag to `Activity Dashboard` queries for improved organization and clarity.
- Added `folder = &quot;&lt;service&gt;&quot;` tag to `service common tag locals` for better query categorization.
- Standardized all queries to use `service common tags`, ensuring consistency across detection queries.</description>
            <pubDate>Mon, 03 Mar 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-action-check-v1-0-1</guid>
            <title>Powerpipe Action Check v1.0.1 - Upgraded actions/upload-artifact to v4</title>
            <link>https://powerpipe.io/changelog/powerpipe-action-check-v1-0-1</link>
            <description>_Bug fixes_

- Upgraded actions/upload-artifact to v4, since v3 was deprecated and caused errors. ([#41](https://github.com/turbot/powerpipe-action-check/issues/41)) ((Thanks [@ido123ziv](https://github.com/ido123ziv) for the contribution!))

_Dependencies_

- Bumped undici from 5.28.4 to 5.28.5 which resolved a moderate Dependabot alert. ([#40](https://github.com/turbot/powerpipe-action-check/pull/40))</description>
            <pubDate>Wed, 12 Feb 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-2-2</guid>
            <title>Powerpipe CLI v1.2.2 - Fixed the dashboard code to ensure that the search path prefix is respected</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-2-2</link>
            <description>_Bug Fixes_

- Fixed the dashboard code to ensure that the search path prefix is respected. ([#717](https://github.com/turbot/powerpipe/issues/717))</description>
            <pubDate>Wed, 05 Feb 2025 10:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-2-1</guid>
            <title>Powerpipe CLI v1.2.1 - Fix backend support if the database is specified by a connection string</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-2-1</link>
            <description>_Bug Fixes_
- Fix backend support if the database is specified by a connection string. ([#713](https://github.com/turbot/powerpipe/issues/713))
- Improve search path button config popover to handle narrower screens. ([#711](https://github.com/turbot/powerpipe/issues/711))
- Dashboard UI sending `changed_input` field at wrong level in `input_changed` event. ([#708](https://github.com/turbot/powerpipe/issues/708))</description>
            <pubDate>Tue, 04 Feb 2025 10:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-2-0</guid>
            <title>Powerpipe CLI v1.2.0 - Added support for Tailpipe detections</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-2-0</link>
            <description>_Whats new_

- Added support for `tailpipe` detections and detection benchmarks.
- Added `tailpipe` connection type.
- Added `detection` command. 
- Added default column support for tables. ([#567](https://github.com/turbot/powerpipe/issues/567))
- Added support for allowing multiple benchmarks/controls to be filtered/grouped on a single dashboard. ([#588](https://github.com/turbot/powerpipe/issues/588))
- Added support for equal/not_equal/in/not_in filters. ([#594](https://github.com/turbot/powerpipe/issues/594))
- Added support for displaying documentation in the Benchmark UI. ([#591](https://github.com/turbot/powerpipe/issues/591))
- Combined snap/open button into a single split button. ([#606](https://github.com/turbot/powerpipe/issues/606))
- Added table column selection to table panel controls. ([#631](https://github.com/turbot/powerpipe/issues/631))
- Added table row view. ([#636](https://github.com/turbot/powerpipe/issues/636))
- Added support for draggable split pane for dashboard UI right content section. ([#648](https://github.com/turbot/powerpipe/issues/648))
- Updated default date_range input to be 7 days. ([#641](https://github.com/turbot/powerpipe/issues/641))
- Added cell filtering to tables. ([#662](https://github.com/turbot/powerpipe/issues/662))
- Added href support to detection column data. ([#642](https://github.com/turbot/powerpipe/issues/642))
- Added table filter side panel for regular tables. ([#670](https://github.com/turbot/powerpipe/issues/670))
- Added `500 MB` limit for opening snapshots. ([#671](https://github.com/turbot/powerpipe/issues/671))
- Added control row detail side panel view. ([#672](https://github.com/turbot/powerpipe/issues/672))
- Added heatmap chart. ([#673](https://github.com/turbot/powerpipe/issues/673))</description>
            <pubDate>Thu, 30 Jan 2025 10:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-tailpipe-mod-gcp-audit-log-detections-mod-v0-1-0</guid>
            <title>GCP Audit Log Detections mod v0.1.0 - Added Audit Log Detections and MITRE ATT&amp;CK v16.1 benchmarks</title>
            <link>https://powerpipe.io/changelog/turbot-tailpipe-mod-gcp-audit-log-detections-mod-v0-1-0</link>
            <description>_What&apos;s new?_

- New benchmarks added:
  - Audit Log Detections benchmark (`powerpipe benchmark run gcp_audit_log_detections.benchmark.audit_log_detections`).
  - MITRE ATT&amp;CK v16.1 benchmark (`powerpipe benchmark run gcp_audit_log_detections.benchmark.mitre_attack_v161`).
  
- New dashboards added:
  - [Audit Log Activity Dashboard](https://hub.powerpipe.io/mods/turbot/gcp_audit_log_detections/dashboards/dashboard.activity_dashboard)</description>
            <pubDate>Thu, 30 Jan 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-tailpipe-mod-azure-activity-log-detections-mod-v0-1-0</guid>
            <title>Azure Activity Log Detections mod v0.1.0 - Added Activity Log Detections and MITRE ATT&amp;CK v16.1 benchmarks</title>
            <link>https://powerpipe.io/changelog/turbot-tailpipe-mod-azure-activity-log-detections-mod-v0-1-0</link>
            <description>_What&apos;s new?_

- New benchmarks added:
  - Activity Log Detections benchmark (`powerpipe benchmark run azure_activity_log_detections.benchmark.activity_log_detections`).
  - MITRE ATT&amp;CK v16.1 benchmark (`powerpipe benchmark run azure_activity_log_detections.benchmark.mitre_attack_v161`).
  
- New dashboards added:
  - [Activity Log Activity Dashboard](https://hub.powerpipe.io/mods/turbot/azure_activity_log_detections/dashboards/dashboard.activity_dashboard)</description>
            <pubDate>Thu, 30 Jan 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-tailpipe-mod-aws-cloudtrail-log-detections-mod-v0-1-0</guid>
            <title>AWS CloudTrail Log Detections mod v0.1.0 - Added CloudTrail Log Detections and MITRE ATT&amp;CK v16.1 benchmarks</title>
            <link>https://powerpipe.io/changelog/turbot-tailpipe-mod-aws-cloudtrail-log-detections-mod-v0-1-0</link>
            <description>_What&apos;s new?_

- New benchmarks added:
  - CloudTrail Log Detections benchmark (`powerpipe benchmark run aws_cloudtrail_log_detections.benchmark.cloudtrail_log_detections`).
  - MITRE ATT&amp;CK v16.1 benchmark (`powerpipe benchmark run aws_cloudtrail_log_detections.benchmark.mitre_attack_v161`).
  
- New dashboards added:
  - [CloudTrail Log Activity Dashboard](https://hub.powerpipe.io/mods/turbot/aws_cloudtrail_log_detections/dashboards/dashboard.activity_dashboard)
  - [CloudTrail Log Root User Activity Report](https://hub.powerpipe.io/mods/turbot/aws_cloudtrail_log_detections/dashboards/dashboard.root_user_activity_report)</description>
            <pubDate>Thu, 30 Jan 2025 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-1-0</guid>
            <title>Powerpipe CLI v1.1.0 - Added support for installing mods from GitLab repositories</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-1-0</link>
            <description>_Whats new_

- Added support for installing mods from GitLab repositories. ([#656](https://github.com/turbot/powerpipe/issues/656))

_Dependencies_

- Upgraded `crypto`, `net`, and `go-git` packages to remediate critical and high vulnerabilities.</description>
            <pubDate>Mon, 20 Jan 2025 10:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-0-1</guid>
            <title>Powerpipe CLI v1.0.1 - Updated error message to inform users to run `make dashboard_assets` when dashboard assets are not present</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-0-1</link>
            <description>_Bug fixes_

- Fixed minor spelling issues in query help output. ([#542](https://github.com/turbot/powerpipe/issues/542))
- Updated error message to inform users to run `make dashboard_assets` when dashboard assets are not present. ([#524](https://github.com/turbot/powerpipe/issues/524))</description>
            <pubDate>Thu, 21 Nov 2024 10:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-2-0</guid>
            <title>AWS Compliance mod v1.2.0 - Added NYDFS 23 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-2-0</link>
            <description>_What&apos;s new?_

- Added NYDFS 23 benchmark (`powerpipe benchmark run aws_compliance.benchmark.nydfs_23`). ([#844](https://github.com/turbot/steampipe-mod-aws-compliance/pull/844))</description>
            <pubDate>Thu, 21 Nov 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v1-1-0</guid>
            <title>Azure Compliance mod v1.1.0 - Added CIS v3.0.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v1-1-0</link>
            <description>_What&apos;s new?_

- Added CIS v3.0.0 benchmark (`powerpipe benchmark run azure_compliance.benchmark.cis_v300`). ([#282](https://github.com/turbot/steampipe-mod-azure-compliance/pull/282))</description>
            <pubDate>Wed, 30 Oct 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-1-1</guid>
            <title>AWS Compliance mod v1.1.1 - Fixed elb_application_lb_waf_enabled and cloudfront_distribution_use_secure_cipher queries</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-1-1</link>
            <description>_Bug fixes_

- Fixed the `elb_application_lb_waf_enabled` query to correctly flag ELB application load balancers as alarm when the associated WAF is disabled. ([#840](https://github.com/turbot/steampipe-mod-aws-compliance/pull/840))
- Fixed the `cloudfront_distribution_custom_origins_encryption_in_transit_enabled` query to remove duplicate AWS CloudFront distributions from the result. ([#829](https://github.com/turbot/steampipe-mod-aws-compliance/pull/829)) (Thanks to [@sbldevnet](https://github.com/sbldevnet) for the contribution!)
- Fixed the `where` clause of the `cloudfront_distribution_use_secure_cipher` query to correctly check if the CloudFront distributions have insecure cipher protocols. ([#827](https://github.com/turbot/steampipe-mod-aws-compliance/pull/827)) (Thanks to [@sbldevnet](https://github.com/sbldevnet) for the contribution!)</description>
            <pubDate>Wed, 30 Oct 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-mods-v1-0-1-release</guid>
            <title>Powerpipe Mods - v1.0.1 release of 24 mods</title>
            <link>https://powerpipe.io/changelog/powerpipe-mods-v1-0-1-release</link>
            <description>_Bug Fixes_

- Cleaned up documentation and standardized the file naming conventions of `*.ppvars.example` files across the following 24 mods to ensure alignment with the Powerpipe v1.0.0 release:
  - `steampipe-mod-alicloud-compliance`
  - `steampipe-mod-aws-perimeter`
  - `steampipe-mod-aws-tags`
  - `steampipe-mod-aws-thrifty`
  - `steampipe-mod-aws-top-10`
  - `steampipe-mod-azure-compliance`
  - `steampipe-mod-azure-tags`
  - `steampipe-mod-azure-thrifty`
  - `steampipe-mod-digitalocean-thrifty`
  - `steampipe-mod-docker-compliance`
  - `steampipe-mod-gcp-compliance`
  - `steampipe-mod-gcp-labels`
  - `steampipe-mod-gcp-thrifty`
  - `steampipe-mod-github-compliance`
  - `steampipe-mod-kubernetes-compliance`
  - `steampipe-mod-microsoft365-compliance`
  - `steampipe-mod-net-insights`
  - `steampipe-mod-oci-compliance`
  - `steampipe-mod-oci-thrifty`
  - `steampipe-mod-snowflake-compliance`
  - `steampipe-mod-terraform-aws-compliance`
  - `steampipe-mod-terraform-azure-compliance`
  - `steampipe-mod-terraform-gcp-compliance`
  - `steampipe-mod-terraform-oci-compliance`</description>
            <pubDate>Mon, 28 Oct 2024 10:01:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-1-0</guid>
            <title>AWS Compliance mod v1.1.0 - Added CIS v4.0.0 and fixed VPC security group rule query bugs</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v1-1-0</link>
            <description>_What&apos;s new?_

- Added CIS v4.0.0 benchmark (`steampipe check benchmark.cis_v400`). ([#836](https://github.com/turbot/steampipe-mod-aws-compliance/pull/836))
- Added `ebs_encryption_by_default_enabled` and `vpc_security_group_restrict_ingress_cifs_port_all` controls to the `All Controls` benchmark. ([#835](https://github.com/turbot/steampipe-mod-aws-compliance/pull/835))

_Enhancements_

- Added the `ebs_encryption_by_default_enabled` control to the `rbi_cyber_security_annex_i_1_3` benchmark. ([#835](https://github.com/turbot/steampipe-mod-aws-compliance/pull/835))
- Set `python3.8` as deprecated Lambda runtime in `lambda_function_use_latest_runtime` control. ([#833](https://github.com/turbot/steampipe-mod-aws-compliance/pull/833)) (Thanks to [@sbldevnet](https://github.com/sbldevnet) for the contribution!)
- Updated `iam_access_analyzer_enabled_without_findings` and `ssm_document_prohibit_public_access` controls to use latest columns and tables from the AWS plugin. ([#835](https://github.com/turbot/steampipe-mod-aws-compliance/pull/835))

_Bug fixes_

- VPC security group rule controls that check for restricted port access now correctly detect rules with ports in a port range instead of only exact port matches. ([#835](https://github.com/turbot/steampipe-mod-aws-compliance/pull/835))
- Fixed the 2.2.1 control in CIS v1.5.0, v2.0.0, v3.0.0 benchmarks to check if EBS encryption by default is enabled instead of individual volume encryption settings. ([#835](https://github.com/turbot/steampipe-mod-aws-compliance/pull/835))
- Fixed the `fedramp_moderate_rev_4_sc_28` benchmark to check if EBS encryption by default is enabled instead of individual volume encryption settings. ([#835](https://github.com/turbot/steampipe-mod-aws-compliance/pull/835))

_Deprecated_

- Deprecated the `ec2_ebs_default_encryption_enabled` control and query. Please use the `ebs_encryption_by_default` control and query instead.</description>
            <pubDate>Fri, 25 Oct 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-mods-v1-0-0-release</guid>
            <title>Powerpipe Mods - v1.0.0 release</title>
            <link>https://powerpipe.io/changelog/powerpipe-mods-v1-0-0-release</link>
            <description>We&apos;re excited to announce the v1.0.0 release of 43 Powerpipe mods!

These mods now require [Powerpipe](https://powerpipe.io). [Steampipe](https://steampipe.io) users should check the [migration guide](https://powerpipe.io/blog/migrating-from-steampipe).</description>
            <pubDate>Tue, 22 Oct 2024 10:01:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v1-0-0</guid>
            <title>Powerpipe CLI v1.0.0</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v1-0-0</link>
            <description>_Whats new_
- `connection` resource to manage credentials. [Documentation](https://powerpipe.io/docs/reference/config-files/connection).
- `database` property has been added to [mod](https://powerpipe.io/docs/powerpipe-hcl/mod). A database can be a connection reference, connection string, or Pipes workspace to query.

_Deprecations_
- Deprecated `database` CLI arg. See [Setting the Database](https://powerpipe.io/docs/run#selecting-a-database) for the new syntax to set the database.
- Deprecated `POWERPIPE_DATABASE` env var. See [Setting the Database](https://powerpipe.io/docs/run#selecting-a-database) for the new syntax to set the database.
- Deprecated `database` workspace profile arg. See [Setting the Database](https://powerpipe.io/docs/run#selecting-a-database) for the new syntax to set the database.</description>
            <pubDate>Tue, 22 Oct 2024 10:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v0-4-4</guid>
            <title>Powerpipe CLI v0.4.4 - Fixed the issue where the search path setting was not retained while navigating to a different dashboard</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v0-4-4</link>
            <description>_Bug fixes_

- Fixed the issue where the search path setting was not retained while navigating to a different dashboard. ([#325](https://github.com/turbot/powerpipe/issues/325))</description>
            <pubDate>Tue, 01 Oct 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-action-setup-v1-0-0</guid>
            <title>Powerpipe Action Setup v1.0.0 - Initial release</title>
            <link>https://powerpipe.io/changelog/powerpipe-action-setup-v1-0-0</link>
            <description>_What&apos;s new?_

- Initial release with support for installing Powerpipe and adding it to $PATH.</description>
            <pubDate>Fri, 13 Sep 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-action-check-v1-0-0</guid>
            <title>Powerpipe Action Check v1.0.0 - Initial release</title>
            <link>https://powerpipe.io/changelog/powerpipe-action-check-v1-0-0</link>
            <description>_What&apos;s new?_

- Initial release with support for running Powerpipe benchmarks and controls, creating annotations for Infrastructure as Code (IaC) checks, and uploading snapshots to Turbot Pipes.</description>
            <pubDate>Fri, 13 Sep 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-98-0</guid>
            <title>AWS Compliance mod v0.98 - Added Australian Cyber Security Center (ACSC) Essential Eight benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-98-0</link>
            <description>_What&apos;s new?_

- Added Australian Cyber Security Center (ACSC) Essential Eight benchmark (`powerpipe benchmark run aws_compliance.benchmark.acsc_essential_eight`). ([#823](https://github.com/turbot/steampipe-mod-aws-compliance/pull/823))</description>
            <pubDate>Fri, 30 Aug 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-insights-mod-v0-22-0</guid>
            <title>AWS Insights mod v0.22 - The VPC Security Group detail page now includes information on the associated services like Amazon MQ broker, ECS service and ECS task</title>
            <link>https://powerpipe.io/changelog/turbot-aws-insights-mod-v0-22-0</link>
            <description>_Enhancements_

- The `VPC Security Group` detail page now includes information on the following associated services: ([#352](https://github.com/turbot/steampipe-mod-aws-insights/pull/352)) (Thanks [@maxcorbin](https://github.com/maxcorbin) for the contribution!)
  - `Amazon MQ broker`
  - `ECS service`
  - `ECS task`</description>
            <pubDate>Tue, 27 Aug 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-34-0</guid>
            <title>GCP Compliance mod v0.34 - Added SOC2 2017 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-34-0</link>
            <description>_What&apos;s new?_

- Added SOC2 2017 benchmark (`powerpipe benchmark run gcp_compliance.benchmark.soc_2_2017`). ([#181](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/181))</description>
            <pubDate>Fri, 23 Aug 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v0-4-3</guid>
            <title>Powerpipe CLI v0.4.3 - Added JSON extension support for DuckDB backends</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v0-4-3</link>
            <description>_Whats new_

- Added JSON extension support for DuckDB backends. ([#467](https://github.com/turbot/powerpipe/issues/467))

_Bug fixes_

- Fixed the incorrect mod reference in the output of `powerpipe help` command. ([#471](https://github.com/turbot/powerpipe/issues/471))</description>
            <pubDate>Thu, 22 Aug 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v0-4-2</guid>
            <title>Powerpipe CLI v0.4.2 - Recompiled CLI with Go v1.22</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v0-4-2</link>
            <description>_Whats new_

- Recompiled CLI with Go v1.22. ([#448](https://github.com/turbot/powerpipe/issues/448))

_Bug fixes_

- Fixed issue where CLI notifications interfered with the Powerpipe JSON outputs resulting in invalid JSON outputs. ([#452](https://github.com/turbot/powerpipe/issues/452))
- Fixed an issue where Powerpipe crashed when running a benchmark with the `--dry-run` flag set. ([#455](https://github.com/turbot/powerpipe/issues/455))</description>
            <pubDate>Wed, 14 Aug 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-97-0</guid>
            <title>AWS Compliance mod v0.97 - Added CIS AWS Compute Services v1.0.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-97-0</link>
            <description>_What&apos;s new?_

- Added CIS AWS Compute Services v1.0.0 benchmark (`powerpipe benchmark run aws_compliance.benchmark.cis_compute_service_v100`). ([#814](https://github.com/turbot/steampipe-mod-aws-compliance/pull/814))

_Bug fixes_

- Fixed `iam_root_user_hardware_mfa_enabled` query to correctly return `ok` when hardware MFA is enabled for the root user. ([#815](https://github.com/turbot/steampipe-mod-aws-compliance/pull/815))</description>
            <pubDate>Mon, 12 Aug 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-33-0</guid>
            <title>GCP Compliance mod v0.33 - Added three new controls to the All Controls benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-33-0</link>
            <description>_Enhancements_

- Added the following controls to the `All Controls` benchmark: ([#176](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/176))
  - `alloydb_instance_log_error_verbosity_database_flag_default_or_stricter`
  - `alloydb_instance_log_min_error_statement_database_flag_configured`
  - `alloydb_instance_log_min_messages_database_flag_error`</description>
            <pubDate>Fri, 02 Aug 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-47-0</guid>
            <title>Azure Compliance mod v0.47 - Added four new controls to the All Controls benchmark and fixed the storage_account_block_public_access query</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-47-0</link>
            <description>_Enhancements_

- Added the following controls to the `All Controls` benchmark: ([#274](https://github.com/turbot/steampipe-mod-azure-compliance/pull/274))
  - `application_gateway_waf_uses_specified_mode`
  - `application_insights_block_log_ingestion_and_querying_from_public`
  - `log_analytics_workspace_block_log_ingestion_and_querying_from_public`
  - `log_analytics_workspace_block_non_azure_ingestion`

_Bug fixes_

- Fixed the `storage_account_block_public_access` query to correctly check if the `public_network_access` column of the `azure_storage_account` table is correctly set to `disabled` or not as per the CIS documentation. ([#277](https://github.com/turbot/steampipe-mod-azure-compliance/pull/277))</description>
            <pubDate>Fri, 02 Aug 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-96-0</guid>
            <title>AWS Compliance mod v0.96 - Added NIST 800-172 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-96-0</link>
            <description>_What&apos;s new?_

- Added NIST 800-172 benchmark (`powerpipe benchmark run aws_compliance.benchmark.nist_800_172`). ([#807](https://github.com/turbot/steampipe-mod-aws-compliance/pull/807))

_Bug fixes_

- Fixed `sqs_queue_encrypted_at_rest` query to ensure queues using `SQS-SSE` encryption at rest remain in an `ok` state instead of `alarm`. ([#805](https://github.com/turbot/steampipe-mod-aws-compliance/pull/805)) (Thanks [@duncward](https://github.com/duncward) for the contribution!)</description>
            <pubDate>Fri, 02 Aug 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v0-4-1</guid>
            <title>Powerpipe CLI v0.4.1 - Fixed issue where the arg flag was not working for control and query runs</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v0-4-1</link>
            <description>_Bug fixes_

- Fixed the issue where the `--arg` flag was not working for control and query runs. ([#439](https://github.com/turbot/powerpipe/issues/439))
- Fixed data inconsistency issue in snapshot output when the same control was included in multiple benchmarks. ([#436](https://github.com/turbot/powerpipe/issues/436))</description>
            <pubDate>Fri, 26 Jul 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-95-0</guid>
            <title>AWS Compliance mod v0.95 - Optimized CloudWatch log group metric queries to minimize API usage, achieving faster performance</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-95-0</link>
            <description>_Enhancements_

- Optimized `log_group_metric_*` queries to minimize API usage, achieving faster performance. ([#802](https://github.com/turbot/steampipe-mod-aws-compliance/pull/802))</description>
            <pubDate>Tue, 25 Jun 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-46-0</guid>
            <title>Azure Compliance mod v0.46 - Added FedRAMP High benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-46-0</link>
            <description>_What&apos;s new?_

- Added FedRAMP High benchmark (`powerpipe benchmark run azure_compliance.benchmark.fedramp_high`). ([#270](https://github.com/turbot/steampipe-mod-azure-compliance/pull/270))</description>
            <pubDate>Fri, 14 Jun 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v0-4-0</guid>
            <title>Powerpipe CLI v0.4.0 - Updated JSON and snapshot output to handle duplicate column names</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v0-4-0</link>
            <description>_Whats new_

- Updated JSON and snapshot output to handle duplicate column names - append a unique suffix to duplicate column names. ([#375](https://github.com/turbot/powerpipe/issues/375))

_Bug fixes_

- Fixed bug when generating a snapshot from a benchmark run, the row data is empty if any of the rows are in error. ([#366](https://github.com/turbot/powerpipe/issues/366))
- Updated mod install to only install or update mods which are command targets (and their dependencies). Set default pull mode for install is latest if there is a target, and minimal if no target is given. ([#381](https://github.com/turbot/powerpipe/issues/381))
- Fixed incorrect help message for output in powerpipe benchmark/control run. ([#367](https://github.com/turbot/powerpipe/issues/367))
- Fixed issue where `POWERPIPE_PORT` env var was not being honoured. ([#362](https://github.com/turbot/powerpipe/issues/362))
- Updated timing metadata output to rename `duration` field to `duration_ms` for consistency with steampipe. ([#368](https://github.com/turbot/powerpipe/issues/368))
- Dashboard graph should not crash if an invalid edge category color is provided. ([#364](https://github.com/turbot/powerpipe/issues/364))
- Dashboard flow/hierarchy components should show panel controls. ([#363](https://github.com/turbot/powerpipe/issues/363))

## Updated output formats
The `rows` property in the `JSON` and `snapshot` output will now have unique column names for duplicate column names. 
The columns property will have the original column name as `original_name`.
For example, for the query:

```powerpipe query run &quot; select arn as title, account_id as title, title as title from aws_account&quot; --output pps```

Here is the updated JSON output:
```
powerpipe query run &quot; select arn as title, account_id as title, title as title from aws_account&quot; --output json
{
 &quot;columns&quot;: [
  {
   &quot;name&quot;: &quot;title&quot;,
   &quot;data_type&quot;: &quot;text&quot;
  },
  {
   &quot;name&quot;: &quot;title_t5zj1&quot;,
   &quot;data_type&quot;: &quot;text&quot;,
   &quot;original_name&quot;: &quot;title&quot;
  },
  {
   &quot;name&quot;: &quot;title_t5zj2&quot;,
   &quot;data_type&quot;: &quot;text&quot;,
   &quot;original_name&quot;: &quot;title&quot;
  }
 ],
 &quot;rows&quot;: [
  {
   &quot;title&quot;: &quot;arn:aws:::882789663776&quot;,
   &quot;title_t5zj1&quot;: &quot;882789663776&quot;,
   &quot;title_t5zj2&quot;: &quot;882789663776&quot;
  },
 ],
 &quot;metadata&quot;: {
  &quot;rows_returned&quot;: 3,
  &quot;duration_ms&quot;: &quot;202ms&quot;
 }
}
```
Here is the updated snapshot output:
```
{
  &quot;schema_version&quot;: &quot;20240130&quot;,
  &quot;panels&quot;: {
    &quot;custom.dashboard.sql_e5br7b82&quot;: {
      &quot;dashboard&quot;: &quot;custom.dashboard.sql_e5br7b82&quot;,
      &quot;name&quot;: &quot;custom.dashboard.sql_e5br7b82&quot;,
      &quot;panel_type&quot;: &quot;dashboard&quot;,
      &quot;source_definition&quot;: &quot;&quot;,
      &quot;status&quot;: &quot;complete&quot;,
      &quot;title&quot;: &quot;Custom query [e5br7b82]&quot;
    },
    &quot;custom.table.results&quot;: {
      &quot;dashboard&quot;: &quot;custom.dashboard.sql_e5br7b82&quot;,
      &quot;name&quot;: &quot;custom.table.results&quot;,
      &quot;panel_type&quot;: &quot;table&quot;,
      &quot;source_definition&quot;: &quot;&quot;,
      &quot;status&quot;: &quot;complete&quot;,
      &quot;sql&quot;: &quot; select arn as title, account_id as title, title as title from aws_account&quot;,
      &quot;properties&quot;: {
        &quot;name&quot;: &quot;results&quot;
      },
      &quot;data&quot;: {
        &quot;columns&quot;: [
          {
            &quot;name&quot;: &quot;title&quot;,
            &quot;data_type&quot;: &quot;TEXT&quot;
          },
          {
            &quot;name&quot;: &quot;title_t5zj1&quot;,
            &quot;data_type&quot;: &quot;TEXT&quot;,
            &quot;original_name&quot;: &quot;title&quot;
          },
          {
            &quot;name&quot;: &quot;title_t5zj2&quot;,
            &quot;data_type&quot;: &quot;TEXT&quot;,
            &quot;original_name&quot;: &quot;title&quot;
          }
        ],
        &quot;rows&quot;: [
          {
            &quot;title&quot;: &quot;arn:aws:::876515858155&quot;,
            &quot;title_t5zj1&quot;: &quot;876515858155&quot;,
            &quot;title_t5zj2&quot;: &quot;morales-aaa&quot;
          },
          {
            &quot;title&quot;: &quot;arn:aws:::882789663776&quot;,
            &quot;title_t5zj1&quot;: &quot;882789663776&quot;,
            &quot;title_t5zj2&quot;: &quot;882789663776&quot;
          },
          {
            &quot;title&quot;: &quot;arn:aws:::097350876455&quot;,
            &quot;title_t5zj1&quot;: &quot;097350876455&quot;,
            &quot;title_t5zj2&quot;: &quot;turbot-silverwater&quot;
          }
        ]
      }
    }
  },
  &quot;inputs&quot;: {},
  &quot;variables&quot;: {},
  &quot;search_path&quot;: null,
  &quot;start_time&quot;: &quot;2024-06-06T14:50:16.906739+01:00&quot;,
  &quot;end_time&quot;: &quot;2024-06-06T14:50:16.991955+01:00&quot;,
  &quot;layout&quot;: {
    &quot;name&quot;: &quot;custom.dashboard.sql_e5br7b82&quot;,
    &quot;children&quot;: [
      {
        &quot;name&quot;: &quot;custom.table.results&quot;,
        &quot;panel_type&quot;: &quot;table&quot;
      }
    ],
    &quot;panel_type&quot;: &quot;dashboard&quot;
  }
}
```</description>
            <pubDate>Mon, 10 Jun 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-32-0</guid>
            <title>GCP Compliance mod v0.32 - Added NIST Cybersecurity Framework (CSF) v1.0 and NIST 800-53 Revision 5 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-32-0</link>
            <description>_What&apos;s new?_

- Added NIST Cybersecurity Framework (CSF) v1.0 benchmark (`powerpipe benchmark run gcp_compliance.benchmark.nist_csf_v10`). ([#168](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/168))
- Added NIST 800-53 Revision 5 benchmark (`powerpipe benchmark run gcp_compliance.benchmark.nist_800_53_rev_5`). ([#168](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/168))

_Bug fixes_

- Fixed the `kms_key_users_limited_to_3` query to correctly return data by removing the hardcoded GCP connection name. ([#170](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/170))
- Fixed the `logging_bucket_retention_policy_enabled` query to correctly return data by adding the missing `project` column to the query. ([#173](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/173))</description>
            <pubDate>Fri, 07 Jun 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-94-0</guid>
            <title>AWS Compliance mod v0.94 - Added Reserve Bank of India - IT Framework for NBFC Regulatory Compliance benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-94-0</link>
            <description>_What&apos;s new?_

- Added Reserve Bank of India - IT Framework for NBFC Regulatory Compliance benchmark (powerpipe benchmark run aws_compliance.benchmark.rbi_itf_nbfc). ([#798](https://github.com/turbot/steampipe-mod-aws-compliance/pull/798))</description>
            <pubDate>Fri, 07 Jun 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-31-0</guid>
            <title>GCP Compliance mod v0.31 - Added HIPAA and PCI DSS v3.2.1 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-31-0</link>
            <description>_What&apos;s new?_

- Added HIPAA benchmark (`powerpipe benchmark run gcp_compliance.benchmark.hipaa`). ([#165](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/165))
- Added PCI DSS v3.2.1 benchmark (`powerpipe benchmark run gcp_compliance.benchmark.pci_dss_v321`). ([#163](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/163))

_Enhancements_

- Optimized several queries to minimize API usage, achieving faster performance. ([#162](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/162))</description>
            <pubDate>Fri, 31 May 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-45-0</guid>
            <title>Azure Compliance mod v0.45 - Added Reserve Bank of India - IT Framework for NBFC Regulatory Compliance benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-45-0</link>
            <description>_What&apos;s new?_

- Added Reserve Bank of India - IT Framework for NBFC Regulatory Compliance
benchmark (`powerpipe benchmark run azure_compliance.benchmark.rbi_itf_nbfc_v2017`). ([#267](https://github.com/turbot/steampipe-mod-azure-compliance/pull/267))</description>
            <pubDate>Fri, 31 May 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v0-3-1</guid>
            <title>Powerpipe CLI v0.3.1 - Fixed the CLI to respect the required app version defined in the powerpipe block of the mod require block</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v0-3-1</link>
            <description>_Bug fixes_

- Respect the app version defined `powerpipe` block of the mod `require` block. ([#405](https://github.com/turbot/pipe-fittings/issues/405))
- Dashboard UI should handle graph categories containing `resource_name` rather than `name`. ([#360](https://github.com/turbot/powerpipe/issues/360))</description>
            <pubDate>Fri, 24 May 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-93-0</guid>
            <title>AWS Compliance mod v0.93 - Added runtime variable support for lambda_function_use_latest_runtime control</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-93-0</link>
            <description>_Enhancements_

- Added runtime variable support for control `lambda_function_use_latest_runtime`. ([#791](https://github.com/turbot/steampipe-mod-aws-compliance/pull/791))

_Bug fixes_

- Fixed the `ecr_repository_image_scan_on_push_enabled` query to use the correct common dimensions. ([#793](https://github.com/turbot/steampipe-mod-aws-compliance/pull/793))</description>
            <pubDate>Fri, 17 May 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-44-0</guid>
            <title>Azure Compliance mod v0.44 - Added NIST SP 800-171 Revision 2 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-44-0</link>
            <description>_What&apos;s new?_

- Added NIST SP 800-171 Revision 2 benchmark (`powerpipe benchmark run azure_compliance.benchmark.nist_sp_800_171_rev_2`). ([#264](https://github.com/turbot/steampipe-mod-azure-compliance/pull/264))</description>
            <pubDate>Thu, 16 May 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-guardrails-insights-mod-v0-5-0</guid>
            <title>Guardrails Insights mod v0.5 - Added new dashboard workspace_report_admin and new benchmark workspace_health</title>
            <link>https://powerpipe.io/changelog/turbot-guardrails-insights-mod-v0-5-0</link>
            <description>_What&apos;s new?_

- New dashboards added:
  - [Turbot Guardrails Workspace Report for Admin](https://hub.steampipe.io/mods/turbot/guardrails_insights/dashboards/dashboard.workspace_report_admin)
- New benchmark added:
  - [Turbot Guardrails Workspace Health](https://hub.steampipe.io/mods/turbot/guardrails_insights/controls/benchmark.workspace_health)</description>
            <pubDate>Tue, 14 May 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-alicloud-insights-mod-v0-9-0</guid>
            <title>Alibaba Cloud Insights mod v0.9 - Optimized queries to leverage the connection-level qualifiers for faster execution time and lower API load</title>
            <link>https://powerpipe.io/changelog/turbot-alicloud-insights-mod-v0-9-0</link>
            <description>_Enhancements_

- Optimized queries to leverage the [connection-level qualifiers](https://steampipe.io/blog/connection-level-qualifiers) for faster execution time and lower API load. To benefit from these enhancements, please upgrade to [AliCloud v0.22.0](https://github.com/turbot/steampipe-plugin-alicloud/blob/main/CHANGELOG.md#v0220-2024-05-13) or higher. ([#95](https://github.com/turbot/steampipe-mod-alicloud-insights/pull/95))</description>
            <pubDate>Tue, 14 May 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v0-3-0</guid>
            <title>Powerpipe CLI v0.3.0 - Added support for installing mods from a branch or from the local file system</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v0-3-0</link>
            <description>_Whats new_

- Added support for installing mods from a branch or from the local file system. ([#285](https://github.com/turbot/powerpipe/issues/285))

  To install from a branch:
  ```
  powerpipe mod install github.com/turbot/steampipe-mod-aws-well-architected#main
  ```

  To reference a mod in the local file system:
  ```
  powerpipe mod install ../mods/local_mod_folder
  ```

- Added `--pull` flag to `mod`, `dashboard` and `benchmark` commands to control the mod update strategy. ([#352](https://github.com/turbot/powerpipe/issues/352)). Possible update strategies are:
  - `full` - check branch and tags for both latest and accuracy
  - `latest` - update everything to latest, but only branches - not tags - are commit checked (which is the same as latest)
  - `development` - update branches and broken constraints to latest, leave satisfied constraints unchanged
  - `minimal` - only update broken constraints, do not check branches for new commits</description>
            <pubDate>Tue, 14 May 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-insights-mod-v0-9-0</guid>
            <title>GCP Insights mod v0.9 - Optimized queries to leverage the connection-level qualifiers for faster execution time and lower API load</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-insights-mod-v0-9-0</link>
            <description>_Enhancements_

- Optimized queries to leverage the [connection-level qualifiers](https://steampipe.io/blog/connection-level-qualifiers) for faster execution time and lower API load. To benefit from these enhancements, please upgrade to [GCP v0.52.0](https://github.com/turbot/steampipe-plugin-gcp/blob/main/CHANGELOG.md#v0520-2024-05-13) or higher. ([#78](https://github.com/turbot/steampipe-mod-gcp-insights/pull/78))</description>
            <pubDate>Mon, 13 May 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-insights-mod-v0-16-0</guid>
            <title>Azure Insights mod v0.16 - Optimized queries to leverage the connection-level qualifiers for faster execution time and lower API load</title>
            <link>https://powerpipe.io/changelog/turbot-azure-insights-mod-v0-16-0</link>
            <description>_Enhancements_

- Optimized queries to leverage the [connection-level qualifiers](https://steampipe.io/blog/connection-level-qualifiers) for faster execution time and lower API load. To benefit from these enhancements, please upgrade to [Azure v0.56.0](https://github.com/turbot/steampipe-plugin-azure/blob/main/CHANGELOG.md#v0560-2024-04-30) or higher. ([#124](https://github.com/turbot/steampipe-mod-azure-insights/pull/124))</description>
            <pubDate>Mon, 13 May 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-insights-mod-v0-21-0</guid>
            <title>AWS Insights mod v0.21 - Optimized queries to leverage the connection-level qualifiers for faster execution time and lower API load</title>
            <link>https://powerpipe.io/changelog/turbot-aws-insights-mod-v0-21-0</link>
            <description>_Enhancements_

- Optimized queries to leverage the [connection-level qualifiers](https://steampipe.io/blog/connection-level-qualifiers) for faster execution time and lower API load. To benefit from these enhancements, please upgrade to [AWS v0.136.0](https://github.com/turbot/steampipe-plugin-aws/blob/main/CHANGELOG.md#v01360-2024-04-19) or higher. ([#347](https://github.com/turbot/steampipe-mod-aws-insights/pull/347))</description>
            <pubDate>Mon, 13 May 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v0-2-0</guid>
            <title>Powerpipe CLI v0.2.0 - Added timeout flags for benchmark and dashboard execution commands</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v0-2-0</link>
            <description>_Whats new_

- It is now possible to set a timeout for benchmark and dashboard execution. These can be set:
    - In the workspace using properties: `dashboard_timeout` and `benchmark_timeout`
    - Using the `--dashboard-timeout` flag for the `dashboard run` and `server` commands
    - Using the `--benchmark-timeout` flag for the `benchmark run` commands.
    - Using the environment variables `POWERPIPE_DASHBOARD_TIMEOUT` and `POWERPIPE_BENCHMARK_TIMEOUT` respectively.
      ([#336](https://github.com/turbot/powerpipe/issues/336))
- Support installing private mods using a GitHub app token. ([#381](https://github.com/turbot/pipe-fittings/issues/381)).
- Improve the layout of filter and grouping components for control tags and dimensions. ([#263](https://github.com/turbot/powerpipe/issues/263))
- Remove the `dashboard input list` and `dashboard input show` commands.
- Add thousands separator to numeric values in dashboard tables. ([#315](https://github.com/turbot/powerpipe/issues/315))
- Only show benchmark cards for statuses that are contained in the current filter and add status to filter on card click. ([#322](https://github.com/turbot/powerpipe/issues/322))

_Bug fixes_

- When calling mod update, respect the argument (if any) and only update specified mods. ([#331](https://github.com/turbot/powerpipe/issues/331))
- Fix `mod update` display of updates to transitive dependencies. ([#288](https://github.com/turbot/powerpipe/issues/288))</description>
            <pubDate>Fri, 26 Apr 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-guardrails-insights-mod-v0-4-0</guid>
            <title>Guardrails Insights mod v0.4 - Updated the workspace_dashboard to include information on the accounts, resources, and active controls across different workspaces</title>
            <link>https://powerpipe.io/changelog/turbot-guardrails-insights-mod-v0-4-0</link>
            <description>_Enhancements_

- Updated the `workspace_dashboard` dashboard to include information on the accounts, resources, and active controls across different workspaces. ([#31](https://github.com/turbot/steampipe-mod-guardrails-insights/pull/31))
- Updated the `workspace_account_report` dashboard to display resources, policy settings, alerts, and active controls across workspaces instead of the TE version. ([#31](https://github.com/turbot/steampipe-mod-guardrails-insights/pull/31))</description>
            <pubDate>Fri, 19 Apr 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-92-0</guid>
            <title>AWS Compliance mod v0.92 - Enhanced several queries to minimize API usage, achieving faster performance</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-92-0</link>
            <description>_Enhancements_

- Optimized several queries to minimize API usage, achieving faster performance. ([#786](https://github.com/turbot/steampipe-mod-aws-compliance/pull/786))</description>
            <pubDate>Fri, 19 Apr 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-30-0</guid>
            <title>GCP Compliance mod v0.30 - Added CIS v3.0.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-30-0</link>
            <description>_What&apos;s new?_

- Added CIS v3.0.0 benchmark (`powerpipe benchmark run gcp_compliance.benchmark.cis_v300`). ([#158](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/158))</description>
            <pubDate>Tue, 16 Apr 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-91-0</guid>
            <title>AWS Compliance mod v0.91 - Updated foundational_security_lambda_2 control to check for the latest Lambda runtimes as per the AWS FSBP documentation</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-91-0</link>
            <description>_Bug fixes_

- Updated the `foundational_security_lambda_2` control to check for the latest Lambda runtimes as per the [AWS FSBP document](https://docs.aws.amazon.com/securityhub/latest/userguide/lambda-controls.html#lambda-2). ([#778](https://github.com/turbot/steampipe-mod-aws-compliance/pull/778)) (Thanks [@sbldevnet](https://github.com/sbldevnet) for the contribution!)
- Fixed the title of `secretsmanager_secret_unused_90_day` control. ([#783](https://github.com/turbot/steampipe-mod-aws-compliance/pull/783))</description>
            <pubDate>Tue, 09 Apr 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-43-0</guid>
            <title>Azure Compliance mod v0.43 - Added new controls to All Controls benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-43-0</link>
            <description>_Enhancements_

- Added the following controls to the `All Controls` benchmark: ([#253](https://github.com/turbot/steampipe-mod-azure-compliance/pull/253))
  - `cosmosdb_account_uses_aad_and_rbac`
  - `iam_user_not_allowed_to_create_tenants`
  - `securitycenter_image_scan_enabled`

_Bug fixes_

- Updated the `postgres_db_server_allow_access_to_azure_services_disabled` query to check if the `endIpAddress` column is set to `0.0.0.0` instead of `255.255.255.255` as per the CIS documentation. ([#253](https://github.com/turbot/steampipe-mod-azure-compliance/pull/253))</description>
            <pubDate>Fri, 05 Apr 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-thrifty-mod-v0-29-0</guid>
            <title>AWS Thrifty mod v0.29 - Added new control rds_mysql_postresql_db_no_unsupported_version</title>
            <link>https://powerpipe.io/changelog/turbot-aws-thrifty-mod-v0-29-0</link>
            <description>_What&apos;s new?_

- New control added:
  - `rds_mysql_postresql_db_no_unsupported_version` ([#174](https://github.com/turbot/steampipe-mod-aws-thrifty/pull/174))</description>
            <pubDate>Wed, 27 Mar 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-insights-mod-v0-20-0</guid>
            <title>AWS Insights mod v0.20 - Fixed the `ecs_cluster_active_service_count` query in the `AWS ECS Cluster Dashboard` to correctly return the count of `Cluster Active Services` instead of `ECS Clusters`</title>
            <link>https://powerpipe.io/changelog/turbot-aws-insights-mod-v0-20-0</link>
            <description>_Bug fixes_

- Fixed the `ecs_cluster_active_service_count` query in the `AWS ECS Cluster Dashboard` to correctly return the count of `Cluster Active Services` instead of `ECS Clusters`. ([#341](https://github.com/turbot/steampipe-mod-aws-insights/pull/341)) (Thanks [@mupi2k](https://github.com/mupi2k) for the contribution!)</description>
            <pubDate>Wed, 27 Mar 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-90-0</guid>
            <title>AWS Compliance mod v0.90 - Added new sub-benchmarks and controls to AWS Foundational Security Best Practices benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-aws-compliance-mod-v0-90-0</link>
            <description>_Breaking changes_

- The `Foundational Security Best Practices v1.0.0` benchmark has been updated to better align with the matching [AWS Security Hub](https://docs.aws.amazon.com/securityhub/latest/userguide/doc-history.html). The following updates have been made: ([#772](https://github.com/turbot/steampipe-mod-aws-compliance/pull/772))
  - The `foundational_security_elbv2` sub-benchmark have been removed.
  - The following controls are no longer included in the benchmarks:
    - `foundational_security_cloudfront_2`
    - `foundational_security_ec2_22`
    - `foundational_security_s3_4`

_Enhancements_

- The `Foundational Security Best Practices v1.0.0` benchmark has been updated to better align with the matching [AWS Security Hub](https://docs.aws.amazon.com/securityhub/latest/userguide/doc-history.html). The following updates have been made: ([#772](https://github.com/turbot/steampipe-mod-aws-compliance/pull/772))
  - The following sub-benchmarks have been added to the `foundational_security` benchmark:
    - `foundational_security_appsync`
    - `foundational_security_backup`
    - `foundational_security_eventbridge`
    - `foundational_security_fsx`
    - `foundational_security_msk`
    - `foundational_security_pca`
    - `foundational_security_route53`
    - `foundational_security_sfn`
  - The following controls have been added to the benchmarks:
    - `foundational_security_acm_2`
    - `foundational_security_appsync_2`
    - `foundational_security_backup_1`
    - `foundational_security_cloudfront_13`
    - `foundational_security_dms_6`
    - `foundational_security_dms_7`
    - `foundational_security_dms_8`
    - `foundational_security_dms_9`
    - `foundational_security_docdb_3`
    - `foundational_security_docdb_4`
    - `foundational_security_docdb_5`
    - `foundational_security_dms_9`
    - `foundational_security_dynamodb_6`
    - `foundational_security_ec2_51`
    - `foundational_security_ecs_9`
    - `foundational_security_eks_8`
    - `foundational_security_elasticbeanstalk_3`
    - `foundational_security_emr_2`
    - `foundational_security_eventbridge_3`
    - `foundational_security_fsx_1`
    - `foundational_security_msk_1`
    - `foundational_security_networkfirewall_2`
    - `foundational_security_networkfirewall_9`
    - `foundational_security_opensearch_10`
    - `foundational_security_pca_1`
    - `foundational_security_rds_34`
    - `foundational_security_rds_35`
    - `foundational_security_route53_2`
    - `foundational_security_s3_19`
    - `foundational_security_sfn_1`
    - `foundational_security_waf_12`</description>
            <pubDate>Fri, 22 Mar 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gitlab-insights-mod-v0-4-0</guid>
            <title>GitLab Insights mod v0.4 - Fixed the `project_license_table`, `project_other_license_count` and `project_weak_copyleft_license_count` queries to use the latest version of EUP (European Union Public License 1.2)</title>
            <link>https://powerpipe.io/changelog/turbot-gitlab-insights-mod-v0-4-0</link>
            <description>_Bug fixes_

- Fixed the `project_license_table`, `project_other_license_count` and `project_weak_copyleft_license_count` queries to use the latest version of EUP (European Union Public License 1.2). ([#13](https://github.com/turbot/steampipe-mod-gitlab-insights/pull/13))</description>
            <pubDate>Wed, 20 Mar 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-github-insights-mod-v0-5-0</guid>
            <title>GitHub Insights mod v0.5 - Fixed the `project_license_table`, `project_other_license_count` and `project_weak_copyleft_license_count` queries to use the latest version of EUP (European Union Public License 1.2)</title>
            <link>https://powerpipe.io/changelog/turbot-github-insights-mod-v0-5-0</link>
            <description>_Bug fixes_

- Fixed the `repository_license_table`, `repository_other_license_count` and `repository_weak_copyleft_license_count` queries to use the latest version of EUP (European Union Public License 1.2). ([#25](https://github.com/turbot/steampipe-mod-github-insights/pull/25))</description>
            <pubDate>Wed, 20 Mar 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-29-0</guid>
            <title>GCP Compliance mod v0.29 - Fixed the CIS controls from `cis_v200_2_4` to `cis_v200_2_11` to correctly evaluate results when using the aggregator connection of the GCP plugin</title>
            <link>https://powerpipe.io/changelog/turbot-gcp-compliance-mod-v0-29-0</link>
            <description>_Bug fixes_

- Fixed the CIS controls from `cis_v200_2_4` to `cis_v200_2_11` to correctly evaluate results when using the aggregator connection of the GCP plugin. ([#154](https://github.com/turbot/steampipe-mod-gcp-compliance/pull/154))</description>
            <pubDate>Wed, 20 Mar 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v0-1-3</guid>
            <title>Powerpipe CLI v0.1.3 - Fix snapshot output for `benchmark run` command</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v0-1-3</link>
            <description>_Bug fixes_
- When exporting or displaying a `benchmark run` result as a snapshot, ensure the top level panel has a valid summary. ([#274](https://github.com/turbot/pipe-fittings/issues/274))
- Update `mod list` output to include `resource_name` and `mod` fields.</description>
            <pubDate>Mon, 18 Mar 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-42-0</guid>
            <title>Azure Compliance mod v0.42 - Added CIS v2.1.0 benchmark</title>
            <link>https://powerpipe.io/changelog/turbot-azure-compliance-mod-v0-42-0</link>
            <description>_What&apos;s new?_

- Added CIS v2.1.0 benchmark (`powerpipe benchmark run azure_compliance.benchmark.cis_v210`). ([#250](https://github.com/turbot/steampipe-mod-azure-compliance/pull/250))</description>
            <pubDate>Fri, 15 Mar 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v0-1-2</guid>
            <title>Powerpipe CLI v0.1.2 - Optimize workspace load time when many mod dependencies are installed.</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v0-1-2</link>
            <description>_Whats new_
- Optimize workspace load time for large workspaces with multiple dependent mods. ([#365](https://github.com/turbot/pipe-fittings/issues/365))</description>
            <pubDate>Fri, 15 Mar 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/powerpipe-cli-v0-1-1</guid>
            <title>Powerpipe CLI v0.1.1 - Fix notification when updated CLI version is available</title>
            <link>https://powerpipe.io/changelog/powerpipe-cli-v0-1-1</link>
            <description>_Bug fixes_
* Fix CLI available version check. ([#250](https://github.com/turbot/powerpipe/issues/250))
* Notify when `mod install` creates a default mod. ([#246](https://github.com/turbot/powerpipe/issues/246))
* Remove newline from end of `mod install` output.  ([#247](https://github.com/turbot/powerpipe/issues/247))
* Fix issue where `asff` output was always missing the first row. ([#249](https://github.com/turbot/powerpipe/pull/249))</description>
            <pubDate>Thu, 07 Mar 2024 09:00:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/initial-powerpipe-mods</guid>
            <title>Powerpipe Mods - 52 new mods</title>
            <link>https://powerpipe.io/changelog/initial-powerpipe-mods</link>
            <description>We&apos;re thrilled to announce the release of 52 new Powerpipe mods, featuring pre-built dashboards and benchmarks for cloud inventory &amp; insights, security &amp; compliance, cost management and shift-left scanning. These include the 43 [Steampipe mods](https://hub.powerpipe.io/?engines=steampipe) to visualize AWS, Azure, GCP, GitHub, Terraform and more using Steampipe as the database. And 9 new, ready-to-use Powerpipe mods providing easy to learn examples to visualize data in [Postgres](https://hub.powerpipe.io/?engines=postgres), [SQLite](https://hub.powerpipe.io/?engines=sqlite), [DuckDB](https://hub.powerpipe.io/?engines=duckdb), and [MySQL](https://hub.powerpipe.io/?engines=mysql)!

A full list of mods can be found in the [Powerpipe Hub](https://hub.powerpipe.io).

For more information on how you can get started incorporating these mods into your own custom dashboards and benchmarks, please see [Introducing Powerpipe - Composable Mods](https://powerpipe.io/blog/introducing-powerpipe#compose-and-create-dashboards-and-benchmarks).</description>
            <pubDate>Wed, 06 Mar 2024 10:01:00 GMT</pubDate>
        </item>
        <item>
            <guid>https://powerpipe.io/changelog/introducing-powerpipe</guid>
            <title>Powerpipe v0.1.0 - Dashboards for DevOps</title>
            <link>https://powerpipe.io/changelog/introducing-powerpipe</link>
            <description>Introducing Powerpipe - Dashboards for DevOps.

*Benchmarks* - 5,000+ open-source controls from CIS, NIST, PCI, HIPAA, FedRamp and more. Run instantly on your machine or as part of your deployment pipeline.

*Relationship Diagrams* - The only dashboarding tool designed from the ground up to visualize DevOps data. Explore your cloud,understand relationships and drill down to the details.

*Dashboards &amp; Reports* - High level dashboards provide a quick management view. Reports highlight misconfigurations and attention areas. Filter, pivot and snapshot results.

*Code, not clicks* - Our dashboards are code. Version controlled, composable, shareable, easy to edit - designed for the way you work. Join our open-source community!

Learn more at:
- Website - https://powerpipe.io
- Docs - https://powerpipe.io/docs
- Hub - https://hub.powerpipe.io
- Introduction - https://powerpipe.io/blog/introducing-powerpipe</description>
            <pubDate>Wed, 06 Mar 2024 10:00:00 GMT</pubDate>
        </item>
    </channel>
</rss>