@@ -1333,319 +1333,3 @@ newrelic.daemon.logfile = "/var/log/newrelic/newrelic-daemon.log"
13331333; for vulnerability management.
13341334;
13351335;newrelic.vulnerability_management.package_detection.enabled = true
1336-
1337- ; Setting: newrelic.security.enabled
1338- ; Type : boolean
1339- ; Scope : system
1340- ; Default: false
1341- ; Info : Indicates if attack detection security module is to be enabled
1342- ;
1343- ;newrelic.security.enabled = true
1344-
1345- ; Setting: newrelic.security.mode
1346- ; Type : string
1347- ; Scope : system
1348- ; Default: "IAST"
1349- ; Info : Security module provides two modes "IAST" or "RASP"
1350- ; See documentation for more details
1351- ;
1352- ;newrelic.security.mode = "IAST"
1353-
1354- ; Setting: newrelic.security.validator_service_endpoint_url
1355- ; Type : string
1356- ; Scope : system
1357- ; Default: "wss://csec.nr-data.net"
1358- ; Info : New Relic<E2><80><99>s security module SaaS connection URLs
1359- ;
1360- ;newrelic.security.validator_service_url = "wss://csec.nr-data.net"
1361-
1362- ; Setting: newrelic.security.agent.enabled
1363- ; Type : boolean
1364- ; Scope : system
1365- ; Default: false
1366- ; Info : Used to enable security module, default false is equivalent to
1367- ; security module not even loaded. If this setting is set to true,
1368- ; then only security module is loaded and to enable it, a restart
1369- ; of application is required. This is different than
1370- ; newrelic.security.enabled, in terms that security.enabled decides
1371- ; runtime behavior of security module but security.agent.enabled
1372- ; would not even load the security module when set to false
1373- ;
1374- ;newrelic.security.agent.enabled = false
1375-
1376- ; Setting: newrelic.security.validator.client_ssl_cert_filepath
1377- ; Type : string
1378- ; Scope : system
1379- ; Default: none
1380- ; Info : Sets the full path of the client certificate in PEM
1381- ; format. When set, this certificate will be used to
1382- ; authenticate the New Relic IAST Security Engine's url. If
1383- ; not set, the default certificate will be used. Make
1384- ; sure the file permissions are correct.
1385- ;
1386- ;newrelic.security.validator.client_ssl_cert_filepath = ""
1387-
1388- ; Setting: newrelic.security.exclude_from_iast_scan.api
1389- ; Type : string
1390- ; Scope : system
1391- ; Default: none
1392- ; Info : A list of valid pcre regex of apis separated by | (pipe) to be
1393- ; excluded for scanning. Make sure each pipe separated regex is correct,
1394- ; otherwise none of the regexes will be applicable.
1395- ;
1396- ;newrelic.security.exclude_from_iast_scan.api = "api1|api2"
1397-
1398- ; Setting: newrelic.security.exclude_from_iast_scan.http_request_parameters.header
1399- ; Type : string
1400- ; Scope : system
1401- ; Default: none
1402- ; Info : A list of request header keys separated by :: (double colon) to be
1403- ; excluded for scanning
1404- ;
1405- ;newrelic.security.exclude_from_iast_scan.http_request_parameters.header = "X-Forwaded-For"
1406-
1407- ; Setting: newrelic.security.exclude_from_iast_scan.http_request_parameters.query
1408- ; Type : string
1409- ; Scope : system
1410- ; Default: none
1411- ; Info : A list of request query keys separated by :: (double colon) to be
1412- ; excluded for scanning
1413- ;
1414- ;newrelic.security.exclude_from_iast_scan.http_request_parameters.query = "username::password"
1415-
1416- ; Setting: newrelic.security.exclude_from_iast_scan.http_request_parameters.body
1417- ; Type : string
1418- ; Scope : system
1419- ; Default: none
1420- ; Info : A list of request body keys separated by :: (double colon) to be
1421- ; excluded for scanning
1422- ;
1423- ;newrelic.security.exclude_from_iast_scan.http_request_parameters.body = "account.email::account.contact"
1424-
1425- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.insecure_settings
1426- ; Type : boolean
1427- ; Scope : system
1428- ; Default: false
1429- ; Info : Indicates if insecure settings attack category is to be excluded
1430- ;
1431- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.insecure_settings = false
1432-
1433- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.invalid_file_access
1434- ; Type : boolean
1435- ; Scope : system
1436- ; Default: false
1437- ; Info : Indicates if invalid file access attack category is to be excluded
1438- ;
1439- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.invalid_file_access = false
1440-
1441- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.sql_injection
1442- ; Type : boolean
1443- ; Scope : system
1444- ; Default: false
1445- ; Info : Indicates if sql injection attack category is to be excluded
1446- ;
1447- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.sql_injection = false
1448-
1449- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.nosql_injection
1450- ; Type : boolean
1451- ; Scope : system
1452- ; Default: false
1453- ; Info : Indicates if nosql injection attack category is to be excluded
1454- ;
1455- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.nosql_injection = false
1456-
1457- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.ldap_injection
1458- ; Type : boolean
1459- ; Scope : system
1460- ; Default: false
1461- ; Info : Indicates if ldap injection attack category is to be excluded
1462- ;
1463- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.ldap_injection = false
1464-
1465- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.javascript_injection
1466- ; Type : boolean
1467- ; Scope : system
1468- ; Default: false
1469- ; Info : Indicates if javascript injection attack category is to be excluded
1470- ;
1471- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.javascript_injection = false
1472-
1473- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.command_injection
1474- ; Type : boolean
1475- ; Scope : system
1476- ; Default: false
1477- ; Info : Indicates if command injection attack category is to be excluded
1478- ;
1479- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.command_injection = false
1480-
1481- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.xpath_injection
1482- ; Type : boolean
1483- ; Scope : system
1484- ; Default: false
1485- ; Info : Indicates if xpath injection attack category is to be excluded
1486- ;
1487- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.xpath_injection = false
1488-
1489- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.ssrf
1490- ; Type : boolean
1491- ; Scope : system
1492- ; Default: false
1493- ; Info : Indicates if ssrf injection attack category is to be excluded
1494- ;
1495- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.ssrf = false
1496-
1497- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.rxss
1498- ; Type : boolean
1499- ; Scope : system
1500- ; Default: false
1501- ; Info : Indicates if reflected xss attack category is to be excluded
1502- ;
1503- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.rxss = false
1504-
1505- ; Setting: newrelic.security.scan_schedule.delay
1506- ; Type : unsigned integer
1507- ; Scope : system
1508- ; Default: 0
1509- ; Info : Sets the delay in minutes after which IAST scan should start
1510- ;
1511- ;newrelic.security.scan_schedule.delay = 0
1512-
1513- ; Setting: newrelic.security.scan_schedule.duration
1514- ; Type : unsigned integer
1515- ; Scope : system
1516- ; Default: 0
1517- ; Info : Sets the duration in minutes for which IAST scan should running
1518- ; default will be forever
1519- ;
1520- ;newrelic.security.scan_schedule.duration = 0
1521-
1522- ; Setting: newrelic.security.scan_schedule.schedule
1523- ; Type : string
1524- ; Scope : system
1525- ; Default: "0 0 * * * ?"
1526- ; Info : Sets the IAST run schedule in cron format. scan_schedule.delay
1527- ; takes precedence over schedule
1528- ;
1529- ;newrelic.security.scan_schedule.schedule = "0 0 * * * ?"
1530-
1531- ; Setting: newrelic.security.scan_schedule.always_sample_traces
1532- ; Type : boolean
1533- ; Scope : system
1534- ; Default: false
1535- ; Info : Always sample traces regardless of other schedule settings
1536- ;
1537- ;newrelic.security.scan_schedule.always_sample_traces = false
1538-
1539- ; Setting: newrelic.security.iast_test_identifier
1540- ; Type : string
1541- ; Scope : system
1542- ; Default: none
1543- ; Info : Sets the identifier for allowing users to run IAST for CI/CD. Provide
1544- ; a unique identifier (i.e. Build Id) to filter application tests properly.
1545- ; Also, configurable via env variable NEW_RELIC_SECURITY_IAST_TEST_IDENTIFIER
1546- ; which takes precedence over this config.
1547- ;
1548- ;newrelic.security.iast_test_identifier = ""
1549-
1550- ; Setting: newrelic.security.scan_controllers.scan_instance_count
1551- ; Type : unsigned integer
1552- ; Scope : system
1553- ; Default: 0
1554- ; Info : Sets the number of application instances where IAST analysis should be performed
1555- ; for a specific entity. Allowed values are 0 or 1, where 0 signifies run on
1556- ; all application instances for that specific entity.
1557- ; If `newrelic.security.iast_test_identifier` is specified, this value is by default 1.
1558- ;
1559- ;newrelic.security.iast_test_identifier = 0
1560-
1561- ; Setting: newrelic.security.scan_controllers.report_http_response_body
1562- ; Type : boolean
1563- ; Scope : system
1564- ; Default: true
1565- ; Info : This configuration allows user to enable / disable sending of HTTP responses body.
1566- ; Disabling reading of http response body will also disable RXSS vulnerability detection.
1567- ;
1568- ;newrelic.security.scan_controllers.report_http_response_body = true
1569-
1570- ; Setting: newrelic.security.restriction_criteria.account_info.account_id_values
1571- ; Type : string
1572- ; Scope : system
1573- ; Default: none
1574- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode`.
1575- ; A list of account id values separated by :: (double colon) to run IAST
1576- ; on specific test accounts only.
1577- ;
1578- ;newrelic.security.restriction_criteria.account_info.account_id_values = "account1::account2"
1579-
1580- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.header.enabled
1581- ; Type : boolean
1582- ; Scope : system
1583- ; Default: false
1584- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1585- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1586- ; Indicates if account id value is to be looked up in the header on which to run IAST.
1587- ;
1588- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.header.enabled = false
1589-
1590- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.header.location
1591- ; Type : string
1592- ; Scope : system
1593- ; Default: none
1594- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1595- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1596- ; A list of header keys separated by :: (double colon) to lookup account id values to
1597- ; run IAST on specific test accounts only.
1598- ;
1599- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.header.location = "X-Account::X-Nr-Account"
1600-
1601- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.body.enabled
1602- ; Type : boolean
1603- ; Scope : system
1604- ; Default: false
1605- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1606- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1607- ; Indicates if account id value is to be looked up in the body on which to run IAST.
1608- ;
1609- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.body.enabled = false
1610-
1611- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.body.location
1612- ; Type : string
1613- ; Scope : system
1614- ; Default: none
1615- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1616- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1617- ; A list of body keys separated by :: (double colon) to lookup account id values to
1618- ; run IAST on specific test accounts only.
1619- ;
1620- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.body.location = "account.id::account.test.id"
1621-
1622- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.query.enabled
1623- ; Type : boolean
1624- ; Scope : system
1625- ; Default: false
1626- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1627- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1628- ; Indicates if account id value is to be looked up in the query on which to run IAST.
1629- ;
1630- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.query.enabled = false
1631-
1632- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.query.location
1633- ; Type : string
1634- ; Scope : system
1635- ; Default: none
1636- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1637- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1638- ; A list of query keys separated by :: (double colon) to lookup account id values to
1639- ; run IAST on specific test accounts only.
1640- ;
1641- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.query.location = "id::user"
1642-
1643- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.path.enabled
1644- ; Type : boolean
1645- ; Scope : system
1646- ; Default: false
1647- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1648- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1649- ; Indicates if account id value is to be looked up in the path on which to run IAST.
1650- ;
1651- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.path.enabled = false
0 commit comments