Skip to content

Commit 53f84ed

Browse files
First draft
1 parent 3e80e18 commit 53f84ed

File tree

4 files changed

+9
-35
lines changed

4 files changed

+9
-35
lines changed

raw-migrated-files/docs-content/serverless/security-spaces.md

Lines changed: 0 additions & 14 deletions
This file was deleted.

raw-migrated-files/security-docs/security/security-spaces.md

Lines changed: 0 additions & 14 deletions
This file was deleted.

raw-migrated-files/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -511,7 +511,6 @@ toc:
511511
- file: docs-content/serverless/security-session-view.md
512512
- file: docs-content/serverless/security-shared-exception-lists.md
513513
- file: docs-content/serverless/security-signals-to-cases.md
514-
- file: docs-content/serverless/security-spaces.md
515514
- file: docs-content/serverless/security-third-party-actions.md
516515
- file: docs-content/serverless/security-threat-intelligence.md
517516
- file: docs-content/serverless/security-timeline-templates-ui.md
@@ -906,7 +905,6 @@ toc:
906905
- file: security-docs/security/security-assistant.md
907906
- file: security-docs/security/security-posture-faq.md
908907
- file: security-docs/security/security-posture-management.md
909-
- file: security-docs/security/security-spaces.md
910908
- file: security-docs/security/self-healing-rollback.md
911909
- file: security-docs/security/session-view.md
912910
- file: security-docs/security/shared-exception-lists.md

solutions/security/get-started/spaces-elastic-security.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,15 @@ mapped_urls:
44
- https://www.elastic.co/guide/en/serverless/current/security-spaces.html
55
---
66

7-
# Spaces and Elastic Security
7+
# Spaces and {{elastic-sec}} [security-spaces]
88

9-
% What needs to be done: Lift-and-shift
9+
{{elastic-sec}} supports the organization of your security operations into logical instances with the [spaces](../../../deploy-manage/manage-spaces.md) feature. Each space in {{kib}} represents a separate logical instance of {{elastic-sec}} in which detection rules, rule exceptions, value lists, alerts, Timelines, cases, and {{kib}} advanced settings are private to the space and accessible only by users that have role privileges to access the space. For details about privileges for {{elastic-sec}} and specific features, refer to [{{elastic-sec}} requirements](../../../solutions/security/get-started/elastic-security-requirements.md).
1010

11-
% Use migrated content from existing pages that map to this page:
11+
For example, if you create a `SOC_prod` space in which you load and activate all the {{elastic-sec}} prebuilt detection rules, these rules and any detection alerts they generate will be accessible only when visiting the {{security-app}} in the `SOC_prod` space. If you then create a new `SOC_dev` space, you’ll notice that no detection rules or alerts are present. Any rules subsequently loaded or created here will be private to the `SOC_dev` space, and they will run independently of those in the `SOC_prod` space.
1212

13-
% - [ ] ./raw-migrated-files/security-docs/security/security-spaces.md
14-
% - [ ] ./raw-migrated-files/docs-content/serverless/security-spaces.md
13+
::::{note}
14+
By default, alerts created by detection rules are stored in {{es}} indices under the `.alerts-security.alerts-<space-name>` index pattern, and they may be accessed by any user with role privileges to access those {{es}} indices. In our example above, any user with {{es}} privileges to access `.alerts-security.alerts-SOC_prod` will be able to view `SOC_prod` alerts from within {{es}} and other {{kib}} apps such as Discover.
15+
16+
To ensure that detection alert data remains private to the space in which it was created, ensure that the roles assigned to your {{elastic-sec}} users include {{es}} privileges that limit their access to alerts within their space’s alerts index.
17+
18+
::::

0 commit comments

Comments
 (0)