@@ -1333,319 +1333,3 @@ newrelic.daemon.logfile = "/var/log/newrelic/newrelic-daemon.log"
1333
1333
; for vulnerability management.
1334
1334
;
1335
1335
;newrelic.vulnerability_management.package_detection.enabled = true
1336
-
1337
- ; Setting: newrelic.security.enabled
1338
- ; Type : boolean
1339
- ; Scope : system
1340
- ; Default: false
1341
- ; Info : Indicates if attack detection security module is to be enabled
1342
- ;
1343
- ;newrelic.security.enabled = true
1344
-
1345
- ; Setting: newrelic.security.mode
1346
- ; Type : string
1347
- ; Scope : system
1348
- ; Default: "IAST"
1349
- ; Info : Security module provides two modes "IAST" or "RASP"
1350
- ; See documentation for more details
1351
- ;
1352
- ;newrelic.security.mode = "IAST"
1353
-
1354
- ; Setting: newrelic.security.validator_service_endpoint_url
1355
- ; Type : string
1356
- ; Scope : system
1357
- ; Default: "wss://csec.nr-data.net"
1358
- ; Info : New Relic<E2><80><99>s security module SaaS connection URLs
1359
- ;
1360
- ;newrelic.security.validator_service_url = "wss://csec.nr-data.net"
1361
-
1362
- ; Setting: newrelic.security.agent.enabled
1363
- ; Type : boolean
1364
- ; Scope : system
1365
- ; Default: false
1366
- ; Info : Used to enable security module, default false is equivalent to
1367
- ; security module not even loaded. If this setting is set to true,
1368
- ; then only security module is loaded and to enable it, a restart
1369
- ; of application is required. This is different than
1370
- ; newrelic.security.enabled, in terms that security.enabled decides
1371
- ; runtime behavior of security module but security.agent.enabled
1372
- ; would not even load the security module when set to false
1373
- ;
1374
- ;newrelic.security.agent.enabled = false
1375
-
1376
- ; Setting: newrelic.security.validator.client_ssl_cert_filepath
1377
- ; Type : string
1378
- ; Scope : system
1379
- ; Default: none
1380
- ; Info : Sets the full path of the client certificate in PEM
1381
- ; format. When set, this certificate will be used to
1382
- ; authenticate the New Relic IAST Security Engine's url. If
1383
- ; not set, the default certificate will be used. Make
1384
- ; sure the file permissions are correct.
1385
- ;
1386
- ;newrelic.security.validator.client_ssl_cert_filepath = ""
1387
-
1388
- ; Setting: newrelic.security.exclude_from_iast_scan.api
1389
- ; Type : string
1390
- ; Scope : system
1391
- ; Default: none
1392
- ; Info : A list of valid pcre regex of apis separated by | (pipe) to be
1393
- ; excluded for scanning. Make sure each pipe separated regex is correct,
1394
- ; otherwise none of the regexes will be applicable.
1395
- ;
1396
- ;newrelic.security.exclude_from_iast_scan.api = "api1|api2"
1397
-
1398
- ; Setting: newrelic.security.exclude_from_iast_scan.http_request_parameters.header
1399
- ; Type : string
1400
- ; Scope : system
1401
- ; Default: none
1402
- ; Info : A list of request header keys separated by :: (double colon) to be
1403
- ; excluded for scanning
1404
- ;
1405
- ;newrelic.security.exclude_from_iast_scan.http_request_parameters.header = "X-Forwaded-For"
1406
-
1407
- ; Setting: newrelic.security.exclude_from_iast_scan.http_request_parameters.query
1408
- ; Type : string
1409
- ; Scope : system
1410
- ; Default: none
1411
- ; Info : A list of request query keys separated by :: (double colon) to be
1412
- ; excluded for scanning
1413
- ;
1414
- ;newrelic.security.exclude_from_iast_scan.http_request_parameters.query = "username::password"
1415
-
1416
- ; Setting: newrelic.security.exclude_from_iast_scan.http_request_parameters.body
1417
- ; Type : string
1418
- ; Scope : system
1419
- ; Default: none
1420
- ; Info : A list of request body keys separated by :: (double colon) to be
1421
- ; excluded for scanning
1422
- ;
1423
- ;newrelic.security.exclude_from_iast_scan.http_request_parameters.body = "account.email::account.contact"
1424
-
1425
- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.insecure_settings
1426
- ; Type : boolean
1427
- ; Scope : system
1428
- ; Default: false
1429
- ; Info : Indicates if insecure settings attack category is to be excluded
1430
- ;
1431
- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.insecure_settings = false
1432
-
1433
- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.invalid_file_access
1434
- ; Type : boolean
1435
- ; Scope : system
1436
- ; Default: false
1437
- ; Info : Indicates if invalid file access attack category is to be excluded
1438
- ;
1439
- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.invalid_file_access = false
1440
-
1441
- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.sql_injection
1442
- ; Type : boolean
1443
- ; Scope : system
1444
- ; Default: false
1445
- ; Info : Indicates if sql injection attack category is to be excluded
1446
- ;
1447
- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.sql_injection = false
1448
-
1449
- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.nosql_injection
1450
- ; Type : boolean
1451
- ; Scope : system
1452
- ; Default: false
1453
- ; Info : Indicates if nosql injection attack category is to be excluded
1454
- ;
1455
- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.nosql_injection = false
1456
-
1457
- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.ldap_injection
1458
- ; Type : boolean
1459
- ; Scope : system
1460
- ; Default: false
1461
- ; Info : Indicates if ldap injection attack category is to be excluded
1462
- ;
1463
- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.ldap_injection = false
1464
-
1465
- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.javascript_injection
1466
- ; Type : boolean
1467
- ; Scope : system
1468
- ; Default: false
1469
- ; Info : Indicates if javascript injection attack category is to be excluded
1470
- ;
1471
- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.javascript_injection = false
1472
-
1473
- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.command_injection
1474
- ; Type : boolean
1475
- ; Scope : system
1476
- ; Default: false
1477
- ; Info : Indicates if command injection attack category is to be excluded
1478
- ;
1479
- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.command_injection = false
1480
-
1481
- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.xpath_injection
1482
- ; Type : boolean
1483
- ; Scope : system
1484
- ; Default: false
1485
- ; Info : Indicates if xpath injection attack category is to be excluded
1486
- ;
1487
- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.xpath_injection = false
1488
-
1489
- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.ssrf
1490
- ; Type : boolean
1491
- ; Scope : system
1492
- ; Default: false
1493
- ; Info : Indicates if ssrf injection attack category is to be excluded
1494
- ;
1495
- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.ssrf = false
1496
-
1497
- ; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.rxss
1498
- ; Type : boolean
1499
- ; Scope : system
1500
- ; Default: false
1501
- ; Info : Indicates if reflected xss attack category is to be excluded
1502
- ;
1503
- ;newrelic.security.exclude_from_iast_scan.iast_detection_category.rxss = false
1504
-
1505
- ; Setting: newrelic.security.scan_schedule.delay
1506
- ; Type : unsigned integer
1507
- ; Scope : system
1508
- ; Default: 0
1509
- ; Info : Sets the delay in minutes after which IAST scan should start
1510
- ;
1511
- ;newrelic.security.scan_schedule.delay = 0
1512
-
1513
- ; Setting: newrelic.security.scan_schedule.duration
1514
- ; Type : unsigned integer
1515
- ; Scope : system
1516
- ; Default: 0
1517
- ; Info : Sets the duration in minutes for which IAST scan should running
1518
- ; default will be forever
1519
- ;
1520
- ;newrelic.security.scan_schedule.duration = 0
1521
-
1522
- ; Setting: newrelic.security.scan_schedule.schedule
1523
- ; Type : string
1524
- ; Scope : system
1525
- ; Default: "0 0 * * * ?"
1526
- ; Info : Sets the IAST run schedule in cron format. scan_schedule.delay
1527
- ; takes precedence over schedule
1528
- ;
1529
- ;newrelic.security.scan_schedule.schedule = "0 0 * * * ?"
1530
-
1531
- ; Setting: newrelic.security.scan_schedule.always_sample_traces
1532
- ; Type : boolean
1533
- ; Scope : system
1534
- ; Default: false
1535
- ; Info : Always sample traces regardless of other schedule settings
1536
- ;
1537
- ;newrelic.security.scan_schedule.always_sample_traces = false
1538
-
1539
- ; Setting: newrelic.security.iast_test_identifier
1540
- ; Type : string
1541
- ; Scope : system
1542
- ; Default: none
1543
- ; Info : Sets the identifier for allowing users to run IAST for CI/CD. Provide
1544
- ; a unique identifier (i.e. Build Id) to filter application tests properly.
1545
- ; Also, configurable via env variable NEW_RELIC_SECURITY_IAST_TEST_IDENTIFIER
1546
- ; which takes precedence over this config.
1547
- ;
1548
- ;newrelic.security.iast_test_identifier = ""
1549
-
1550
- ; Setting: newrelic.security.scan_controllers.scan_instance_count
1551
- ; Type : unsigned integer
1552
- ; Scope : system
1553
- ; Default: 0
1554
- ; Info : Sets the number of application instances where IAST analysis should be performed
1555
- ; for a specific entity. Allowed values are 0 or 1, where 0 signifies run on
1556
- ; all application instances for that specific entity.
1557
- ; If `newrelic.security.iast_test_identifier` is specified, this value is by default 1.
1558
- ;
1559
- ;newrelic.security.iast_test_identifier = 0
1560
-
1561
- ; Setting: newrelic.security.scan_controllers.report_http_response_body
1562
- ; Type : boolean
1563
- ; Scope : system
1564
- ; Default: true
1565
- ; Info : This configuration allows user to enable / disable sending of HTTP responses body.
1566
- ; Disabling reading of http response body will also disable RXSS vulnerability detection.
1567
- ;
1568
- ;newrelic.security.scan_controllers.report_http_response_body = true
1569
-
1570
- ; Setting: newrelic.security.restriction_criteria.account_info.account_id_values
1571
- ; Type : string
1572
- ; Scope : system
1573
- ; Default: none
1574
- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode`.
1575
- ; A list of account id values separated by :: (double colon) to run IAST
1576
- ; on specific test accounts only.
1577
- ;
1578
- ;newrelic.security.restriction_criteria.account_info.account_id_values = "account1::account2"
1579
-
1580
- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.header.enabled
1581
- ; Type : boolean
1582
- ; Scope : system
1583
- ; Default: false
1584
- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1585
- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1586
- ; Indicates if account id value is to be looked up in the header on which to run IAST.
1587
- ;
1588
- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.header.enabled = false
1589
-
1590
- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.header.location
1591
- ; Type : string
1592
- ; Scope : system
1593
- ; Default: none
1594
- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1595
- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1596
- ; A list of header keys separated by :: (double colon) to lookup account id values to
1597
- ; run IAST on specific test accounts only.
1598
- ;
1599
- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.header.location = "X-Account::X-Nr-Account"
1600
-
1601
- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.body.enabled
1602
- ; Type : boolean
1603
- ; Scope : system
1604
- ; Default: false
1605
- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1606
- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1607
- ; Indicates if account id value is to be looked up in the body on which to run IAST.
1608
- ;
1609
- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.body.enabled = false
1610
-
1611
- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.body.location
1612
- ; Type : string
1613
- ; Scope : system
1614
- ; Default: none
1615
- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1616
- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1617
- ; A list of body keys separated by :: (double colon) to lookup account id values to
1618
- ; run IAST on specific test accounts only.
1619
- ;
1620
- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.body.location = "account.id::account.test.id"
1621
-
1622
- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.query.enabled
1623
- ; Type : boolean
1624
- ; Scope : system
1625
- ; Default: false
1626
- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1627
- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1628
- ; Indicates if account id value is to be looked up in the query on which to run IAST.
1629
- ;
1630
- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.query.enabled = false
1631
-
1632
- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.query.location
1633
- ; Type : string
1634
- ; Scope : system
1635
- ; Default: none
1636
- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1637
- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1638
- ; A list of query keys separated by :: (double colon) to lookup account id values to
1639
- ; run IAST on specific test accounts only.
1640
- ;
1641
- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.query.location = "id::user"
1642
-
1643
- ; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.path.enabled
1644
- ; Type : boolean
1645
- ; Scope : system
1646
- ; Default: false
1647
- ; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1648
- ; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1649
- ; Indicates if account id value is to be looked up in the path on which to run IAST.
1650
- ;
1651
- ;newrelic.security.restriction_criteria.account_info.mapping_parameters.path.enabled = false
0 commit comments