Skip to content

Commit d0e439b

Browse files
authored
Merge branch 'main' into remove-endpoint-terminology
2 parents 4d9b510 + b8409b1 commit d0e439b

File tree

5 files changed

+68
-18
lines changed

5 files changed

+68
-18
lines changed

solutions/observability/apps/transaction-sampling.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ Enable tail-based sampling with [Enable tail-based sampling](../../../solutions/
198198
Trace events are matched to policies in the order specified. Each policy list must conclude with a default policy — one that only specifies a sample rate. This default policy is used to catch remaining trace events that don’t match a stricter policy. Requiring this default policy ensures that traces are only dropped intentionally. If you enable tail-based sampling and send a transaction that does not match any of the policies, APM Server will reject the transaction with the error `no matching policy`.
199199

200200
::::{important}
201-
Please note that from version `8.3.1` APM Server implements a default storage limit of 3GB, but, due to how the limit is calculated and enforced the actual disk space may still grow slightly over the limit.
201+
Please note that from version `9.0.0` APM Server has an unlimited storage limit, but will stop writing when the disk where the database resides reaches 80% usage. Due to how the limit is calculated and enforced, the actual disk space may still grow slightly over this disk usage based limit, or any configured storage limit.
202202
::::
203203

204204

solutions/security/cloud/cloud-native-vulnerability-management.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,11 @@ CNVM currently only supports AWS EC2 Linux workloads.
2020

2121

2222
::::{admonition} Requirements
23-
* CNVM is available to all {{ecloud}} users. On-premise deployments require an [Enterprise subscription](https://www.elastic.co/pricing).
24-
* Requires {{stack}} and {{agent}} version 8.8 or higher.
23+
* {{stack}} users: {{stack}} version 8.8 or higher and an [Enterprise subscription](https://www.elastic.co/pricing).
2524
* CNVM only works in the `Default` {{kib}} space. Installing the CNVM integration on a different {{kib}} space will not work.
26-
* To view vulnerability scan findings, you need at least `read` privileges for the following indices:
27-
28-
* `logs-cloud_security_posture.vulnerabilities-*`
29-
* `logs-cloud_security_posture.vulnerabilities_latest-*`
30-
31-
25+
* CNVM can only be deployed on ARM-based VMs.
26+
* You need an AWS user account with permissions to perform the following actions: run CloudFormation templates, create IAM Roles and InstanceProfiles, and create EC2 SecurityGroups and Instances.
27+
* Depending on whether you want to `read`, `write`, or `manage` CNVM data, you need [specific privileges](/solutions/security/cloud/cnvm-privilege-requirements.md).
3228
::::
3329

3430

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
applies_to:
3+
stack: all
4+
serverless:
5+
security: all
6+
---
7+
8+
# CNVM privilege requirements [cnvm-required-permissions]
9+
10+
This page lists required privileges for {{elastic-sec}}'s CNVM features. There are three access levels: `read`, `write`, and `manage`. Each access level and its requirements are described below.
11+
12+
## Read
13+
14+
Users with these minimum permissions can view data on the **Findings** page.
15+
16+
### {{es}} index privileges
17+
18+
`Read` privileges for the following {{es}} indices:
19+
20+
* `logs-cloud_security_posture.vulnerabilities_latest-default`
21+
* `logs-cloud_security_posture.scores-default`
22+
23+
### {{kib}} privileges
24+
25+
* `Security: Read`
26+
27+
## Write
28+
29+
Users with these minimum permissions can view data on the **Findings** page and create detection rules from the findings details flyout.
30+
31+
### {{es}} index privileges
32+
`Read` privileges for the following {{es}} indices:
33+
34+
* `logs-cloud_security_posture.vulnerabilities_latest-default`
35+
* `logs-cloud_security_posture.scores-default`
36+
37+
### {{kib}} privileges
38+
39+
* `Security: All`
40+
41+
42+
## Manage
43+
44+
Users with these minimum permissions can view data on the **Findings** page, create detection rules from the findings details flyout, and install, update, or uninstall integrations and assets.
45+
46+
### {{es}} index privileges
47+
48+
`Read` privileges for the following {{es}} indices:
49+
50+
* `logs-cloud_security_posture.vulnerabilities_latest-default`
51+
* `logs-cloud_security_posture.scores-default`
52+
53+
### {{kib}} privileges
54+
55+
* `Security: All`
56+
* `Spaces: All`
57+
* `Fleet: All`
58+
* `Integrations: All`
59+

solutions/security/cloud/get-started-with-cnvm.md

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,11 @@ applies_to:
1414
This page explains how to set up Cloud Native Vulnerability Management (CNVM).
1515

1616
::::{admonition} Requirements
17-
* CNVM is available to all {{ecloud}} users. On-premise deployments require an [Enterprise subscription](https://www.elastic.co/pricing).
18-
* Requires {{stack}} and {{agent}} version 8.8 or higher.
19-
* Only works in the `Default` {{kib}} space. Installing the CNVM integration on a different {{kib}} space will not work.
17+
* {{stack}} users: {{stack}} version 8.8 or higher and an [Enterprise subscription](https://www.elastic.co/pricing).
18+
* CNVM only works in the `Default` {{kib}} space. Installing the CNVM integration on a different {{kib}} space will not work.
2019
* CNVM can only be deployed on ARM-based VMs.
21-
* To view vulnerability scan findings, you need at least `read` privileges for the following indices:
22-
23-
* `logs-cloud_security_posture.vulnerabilities-*`
24-
* `logs-cloud_security_posture.vulnerabilities_latest-*`
25-
2620
* You need an AWS user account with permissions to perform the following actions: run CloudFormation templates, create IAM Roles and InstanceProfiles, and create EC2 SecurityGroups and Instances.
27-
21+
* Depending on whether you want to `read`, `write`, or `manage` CNVM data, you need [specific privileges](/solutions/security/cloud/cnvm-privilege-requirements.md).
2822
::::
2923

3024

solutions/toc.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -573,6 +573,7 @@ toc:
573573
- file: security/cloud/cloud-native-vulnerability-management.md
574574
children:
575575
- file: security/cloud/get-started-with-cnvm.md
576+
- file: security/cloud/cnvm-privilege-requirements.md
576577
- file: security/cloud/findings-page-3.md
577578
- file: security/dashboards/cloud-native-vulnerability-management-dashboard.md
578579
- file: security/cloud/cnvm-frequently-asked-questions-faq.md

0 commit comments

Comments
 (0)