Skip to content

Commit ea041dc

Browse files
Cloud security integrations 9.1 (#2318)
Fixes #2090 , fixes #2091 , fixes #2092 by documenting several new integrations. Decided to do these in one PR since they have similar structure and are in the same section. --------- Co-authored-by: Mike Birnstiehl <[email protected]>
1 parent b480f94 commit ea041dc

File tree

8 files changed

+123
-14
lines changed

8 files changed

+123
-14
lines changed

solutions/security/cloud/ingest-aws-security-hub-data.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,13 @@ products:
1111
- id: cloud-serverless
1212
---
1313

14-
# Ingest AWS Security Hub data
14+
# AWS Security Hub
15+
This page explains how to make data from the AWS Security Hub integration appear in the following places within {{elastic-sec}}:
1516

16-
In order to enrich your {{elastic-sec}} workflows with third-party cloud security posture data collected by AWS Security Hub:
17+
- **Findings page**: Data appears on the [Misconfigurations](/solutions/security/cloud/findings-page.md) tab.
18+
- **Alert and Entity details flyouts**: Applicable data appears in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section).
19+
20+
In order for AWS Security Hub data to appear in these workflows:
1721

1822
* Follow the steps to [set up the AWS Security Hub integration](https://docs.elastic.co/en/integrations/aws/securityhub).
1923
* Make sure the integration version is at least 2.31.1.
@@ -24,7 +28,6 @@ In order to enrich your {{elastic-sec}} workflows with third-party cloud securit
2428
:alt: AWS Security Hub integration settings showing the findings toggle
2529
:::
2630

27-
After you’ve completed these steps, AWS Security Hub data will appear on the Misconfigurations tab of the [Findings](/solutions/security/cloud/findings-page.md) page.
28-
29-
Any available findings data will also appear in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section) for related alerts. If alerts are present for a user or host that has findings data from AWS Security Hub, the findings will appear on the [entity details flyout](/solutions/security/advanced-entity-analytics/view-entity-details.md#entity-details-flyout).
30-
31+
::::{note}
32+
You can ingest data from the AWS Security Hub integration for other purposes without following these steps.
33+
::::

solutions/security/cloud/ingest-cncf-falco-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ products:
1111
- id: cloud-serverless
1212
---
1313

14-
# Ingest CNCF Falco data
14+
# CNCF Falco
1515

1616
CNCF Falco is an open-source runtime security tool that detects anomalous activity in Linux hosts, containers, Kubernetes, and cloud environments. You can ingest Falco alerts into {{es}} to view them on {{elastic-sec}}'s Alerts page and incorporate them into your security workflows by using Falcosidekick, a proxy forwarder which can send alerts from your Falco deployments to {{es}}.
1717

solutions/security/cloud/ingest-third-party-cloud-security-data.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,5 +29,10 @@ You can ingest third-party cloud security alerts into {{elastic-sec}} to view th
2929

3030
You can ingest third-party data into {{elastic-sec}} to review and investigate it alongside data collected by {{elastic-sec}}'s native cloud security integrations. Once ingested, cloud security posture and vulnerability data appears on the [Findings](/solutions/security/cloud/findings-page.md) page, on the [Cloud Posture dashboard](/solutions/security/dashboards/cloud-security-posture-dashboard.md), and in the [entity details](/solutions/security/advanced-entity-analytics/view-entity-details.md#entity-details-flyout) and [alert details](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section) flyouts.
3131

32-
* Learn to [ingest cloud security posture data from AWS Security Hub](/solutions/security/cloud/ingest-aws-security-hub-data.md).
33-
* Learn to [ingest cloud security posture and vulnerability data from Wiz](/solutions/security/cloud/ingest-wiz-data.md).
32+
Data from each of the following integrations can feed into at least some of these workflows:
33+
34+
* [AWS Security Hub](/solutions/security/cloud/ingest-aws-security-hub-data.md).
35+
* [Wiz](/solutions/security/cloud/ingest-wiz-data.md).
36+
* [Rapid7 InsightVM](/solutions/security/cloud/integration-rapid7.md).
37+
* [Tenable VM](/solutions/security/cloud/integration-tenablevm.md).
38+
* [Qualys VMDR](/solutions/security/cloud/integration-qualys.md).

solutions/security/cloud/ingest-wiz-data.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,15 @@ products:
1111
- id: cloud-serverless
1212
---
1313

14-
# Ingest Wiz data
14+
# Wiz
1515

16-
In order to enrich your {{elastic-sec}} workflows with third-party cloud security posture and vulnerability data collected by Wiz:
16+
This page explains how to make data from the Wiz integration appear in the following places within {{elastic-sec}}:
17+
18+
- **Findings page**: Data appears on the [Vulnerabilities](/solutions/security/cloud/findings-page-3.md) tab and the [Misconfiguations](/solutions/security/cloud/findings-page.md) tab.
19+
- **Alert and Entity details flyouts**: Applicable data appears in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section).
20+
21+
22+
In order for Wiz data to appear in these workflows:
1723

1824
* Follow the steps to [set up the Wiz integration](https://docs.elastic.co/en/integrations/wiz).
1925
* Make sure the integration version is at least 2.0.1.
@@ -28,10 +34,8 @@ In order to enrich your {{elastic-sec}} workflows with third-party cloud securit
2834
:alt: Wiz integration settings showing the vulnerabilities toggle
2935
:::
3036

31-
After you’ve completed these steps, Wiz data will appear on the [Misconfiguations](/solutions/security/cloud/findings-page.md) and [Vulnerabilities](/solutions/security/cloud/findings-page-3.md) tabs of the Findings page.
37+
Your Wiz data should now appear throughout {{elastic-sec}}.
3238

3339
:::{image} /solutions/images/security-wiz-findings.png
3440
:alt: Wiz data on the Findings page
3541
:::
36-
37-
Any available findings data will also appear in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section) for related alerts. If alerts are present for a user or host that has findings data from Wiz, the findings will appear on the [entity details flyout](/solutions/security/advanced-entity-analytics/view-entity-details.md#entity-details-flyout).
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
applies_to:
3+
stack: all
4+
serverless:
5+
security: all
6+
products:
7+
- id: security
8+
- id: cloud-serverless
9+
---
10+
11+
# Qualys VMDR
12+
13+
This page explains how to make data from the Qualys Vulnerability Management, Detection and Response integration (Qualys VMDR) appear in the following places within {{elastic-sec}}:
14+
15+
- **Findings page**: Data appears on the [Vulnerabilities](/solutions/security/cloud/findings-page-3.md) tab.
16+
- **Alert and Entity details flyouts**: Applicable data appears in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section).
17+
18+
:::{note}
19+
Data from this integration does not appear on the [CNVM dashboard](/solutions/security/cloud/cnvm-dashboard.md).
20+
:::
21+
22+
In order for Qualys VMDR data to appear in these workflows:
23+
24+
- Ensure you have read privileges for the following index: `security_solution-*.vulnerability_latest`.
25+
- Follow the steps to [set up the Qualys VMDR integration](https://www.elastic.co/docs/reference/integrations/qualys_vmdr).
26+
- While configuring the integration, in the **Host detection data** section, under **Input parameters**, enter `host_metadata=all`. This enables the ingest of `cloud.*` fields.
27+
- ({{stack}} users) Ensure you're on at least v8.16.
28+
- Make sure the integration version is at least 6.0.0.
29+
30+
:::{note}
31+
You can ingest data from the Qualys VMDR integration for other purposes without following these steps.
32+
:::
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
applies_to:
3+
stack: all
4+
serverless:
5+
security: all
6+
products:
7+
- id: security
8+
- id: cloud-serverless
9+
---
10+
11+
12+
# Rapid7
13+
This page explains how to make data from the Rapid7 InsightVM integration (Rapid7) appear in the following places within {{elastic-sec}}:
14+
15+
- **Findings page**: Data appears on the [Vulnerabilities](/solutions/security/cloud/findings-page-3.md) tab.
16+
- **Alert and Entity details flyouts**: Applicable data appears in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section).
17+
18+
:::{note}
19+
Data from this integration does not appear on the [CNVM dashboard](/solutions/security/cloud/cnvm-dashboard.md).
20+
:::
21+
22+
In order for Rapid7 data to appear in these workflows:
23+
24+
- Ensure you have read privileges for the following index: `security_solution-*.vulnerability_latest`.
25+
- Follow the steps to [set up the Rapid7 integration](https://www.elastic.co/docs/reference/integrations/rapid7_insightvm).
26+
- ({{stack}} users) Ensure you're on at least v9.1.
27+
- Make sure the Rapid7 version is at least 2.0.0.
28+
29+
:::{note}
30+
You can ingest data from the Rapid7 integration for other purposes without following these steps.
31+
:::
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
applies_to:
3+
stack: all
4+
serverless:
5+
security: all
6+
products:
7+
- id: security
8+
- id: cloud-serverless
9+
---
10+
11+
12+
# Tenable VM
13+
This page explains how to make data from the Tenable Vulnerability Management integration (Tenable VM) appear in the following places within {{elastic-sec}}:
14+
15+
- **Findings page**: Data appears on the [Vulnerabilities](/solutions/security/cloud/findings-page-3.md) tab.
16+
- **Alert and Entity details flyouts**: Applicable data appears in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section).
17+
18+
::::{note}
19+
Data from this integration does not appear on the [CNVM dashboard](/solutions/security/cloud/cnvm-dashboard.md).
20+
::::
21+
22+
In order for Tenable VM data to appear in these workflows:
23+
24+
- Ensure you have read privileges for the following index: `security_solution-*.vulnerability_latest`.
25+
- Follow the steps to [set up the Tenable VM integration](https://www.elastic.co/docs/reference/integrations/tenable_io).
26+
- ({{stack}} users) Ensure you're on at least v9.1.
27+
- Make sure the Tenable VM version is at least 4.0.0.
28+
29+
::::{note}
30+
You can ingest data from the Tenable VM integration for other purposes without following these steps.
31+
::::

solutions/toc.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -614,6 +614,9 @@ toc:
614614
- file: security/cloud/ingest-cncf-falco-data.md
615615
- file: security/cloud/ingest-aws-security-hub-data.md
616616
- file: security/cloud/ingest-wiz-data.md
617+
- file: security/cloud/integration-qualys.md
618+
- file: security/cloud/integration-tenablevm.md
619+
- file: security/cloud/integration-rapid7.md
617620
- file: security/investigate.md
618621
children:
619622
- file: security/investigate/timeline.md

0 commit comments

Comments
 (0)