Skip to content

Commit b8409b1

Browse files
Creates CNVM permissions page (#791)
Fixes #420 by creating the cloud native vulnerability management privilege requirements page. In addition to creating the CNVM privileges page, updates the requirements sections of the CNVM landing page and Get started with CNVM page. --------- Co-authored-by: Nastasha Solomon <[email protected]>
1 parent 9c37254 commit b8409b1

File tree

4 files changed

+67
-17
lines changed

4 files changed

+67
-17
lines changed

solutions/security/cloud/cloud-native-vulnerability-management.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,11 @@ CNVM currently only supports AWS EC2 Linux workloads.
2020

2121

2222
::::{admonition} Requirements
23-
* CNVM is available to all {{ecloud}} users. On-premise deployments require an [Enterprise subscription](https://www.elastic.co/pricing).
24-
* Requires {{stack}} and {{agent}} version 8.8 or higher.
23+
* {{stack}} users: {{stack}} version 8.8 or higher and an [Enterprise subscription](https://www.elastic.co/pricing).
2524
* CNVM only works in the `Default` {{kib}} space. Installing the CNVM integration on a different {{kib}} space will not work.
26-
* To view vulnerability scan findings, you need at least `read` privileges for the following indices:
27-
28-
* `logs-cloud_security_posture.vulnerabilities-*`
29-
* `logs-cloud_security_posture.vulnerabilities_latest-*`
30-
31-
25+
* CNVM can only be deployed on ARM-based VMs.
26+
* You need an AWS user account with permissions to perform the following actions: run CloudFormation templates, create IAM Roles and InstanceProfiles, and create EC2 SecurityGroups and Instances.
27+
* Depending on whether you want to `read`, `write`, or `manage` CNVM data, you need [specific privileges](/solutions/security/cloud/cnvm-privilege-requirements.md).
3228
::::
3329

3430

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
applies_to:
3+
stack: all
4+
serverless:
5+
security: all
6+
---
7+
8+
# CNVM privilege requirements [cnvm-required-permissions]
9+
10+
This page lists required privileges for {{elastic-sec}}'s CNVM features. There are three access levels: `read`, `write`, and `manage`. Each access level and its requirements are described below.
11+
12+
## Read
13+
14+
Users with these minimum permissions can view data on the **Findings** page.
15+
16+
### {{es}} index privileges
17+
18+
`Read` privileges for the following {{es}} indices:
19+
20+
* `logs-cloud_security_posture.vulnerabilities_latest-default`
21+
* `logs-cloud_security_posture.scores-default`
22+
23+
### {{kib}} privileges
24+
25+
* `Security: Read`
26+
27+
## Write
28+
29+
Users with these minimum permissions can view data on the **Findings** page and create detection rules from the findings details flyout.
30+
31+
### {{es}} index privileges
32+
`Read` privileges for the following {{es}} indices:
33+
34+
* `logs-cloud_security_posture.vulnerabilities_latest-default`
35+
* `logs-cloud_security_posture.scores-default`
36+
37+
### {{kib}} privileges
38+
39+
* `Security: All`
40+
41+
42+
## Manage
43+
44+
Users with these minimum permissions can view data on the **Findings** page, create detection rules from the findings details flyout, and install, update, or uninstall integrations and assets.
45+
46+
### {{es}} index privileges
47+
48+
`Read` privileges for the following {{es}} indices:
49+
50+
* `logs-cloud_security_posture.vulnerabilities_latest-default`
51+
* `logs-cloud_security_posture.scores-default`
52+
53+
### {{kib}} privileges
54+
55+
* `Security: All`
56+
* `Spaces: All`
57+
* `Fleet: All`
58+
* `Integrations: All`
59+

solutions/security/cloud/get-started-with-cnvm.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,11 @@ applies_to:
1414
This page explains how to set up Cloud Native Vulnerability Management (CNVM).
1515

1616
::::{admonition} Requirements
17-
* CNVM is available to all {{ecloud}} users. On-premise deployments require an [Enterprise subscription](https://www.elastic.co/pricing).
18-
* Requires {{stack}} and {{agent}} version 8.8 or higher.
19-
* Only works in the `Default` {{kib}} space. Installing the CNVM integration on a different {{kib}} space will not work.
17+
* {{stack}} users: {{stack}} version 8.8 or higher and an [Enterprise subscription](https://www.elastic.co/pricing).
18+
* CNVM only works in the `Default` {{kib}} space. Installing the CNVM integration on a different {{kib}} space will not work.
2019
* CNVM can only be deployed on ARM-based VMs.
21-
* To view vulnerability scan findings, you need at least `read` privileges for the following indices:
22-
23-
* `logs-cloud_security_posture.vulnerabilities-*`
24-
* `logs-cloud_security_posture.vulnerabilities_latest-*`
25-
2620
* You need an AWS user account with permissions to perform the following actions: run CloudFormation templates, create IAM Roles and InstanceProfiles, and create EC2 SecurityGroups and Instances.
27-
21+
* Depending on whether you want to `read`, `write`, or `manage` CNVM data, you need [specific privileges](/solutions/security/cloud/cnvm-privilege-requirements.md).
2822
::::
2923

3024

solutions/toc.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -573,6 +573,7 @@ toc:
573573
- file: security/cloud/cloud-native-vulnerability-management.md
574574
children:
575575
- file: security/cloud/get-started-with-cnvm.md
576+
- file: security/cloud/cnvm-privilege-requirements.md
576577
- file: security/cloud/findings-page-3.md
577578
- file: security/dashboards/cloud-native-vulnerability-management-dashboard.md
578579
- file: security/cloud/cnvm-frequently-asked-questions-faq.md

0 commit comments

Comments
 (0)