Skip to content

Commit 5d80ce3

Browse files
authored
Add Defender for Cloud to 3rd party integrations permissions required for transform (#133623) (#133799)
Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to #132445 (cherry picked from commit eb005b0)
1 parent 16b48f3 commit 5d80ce3

File tree

2 files changed

+7
-2
lines changed

2 files changed

+7
-2
lines changed

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -486,7 +486,11 @@ static RoleDescriptor kibanaSystem(String name) {
486486
// For source indices of the Cloud Detection & Response (CDR) packages
487487
// that ships a transform and has ILM policy
488488
RoleDescriptor.IndicesPrivileges.builder()
489-
.indices("logs-m365_defender.vulnerability-*", "logs-microsoft_defender_endpoint.vulnerability-*")
489+
.indices(
490+
"logs-m365_defender.vulnerability-*",
491+
"logs-microsoft_defender_endpoint.vulnerability-*",
492+
"logs-microsoft_defender_cloud.assessment-*"
493+
)
490494
.privileges(
491495
"read",
492496
"view_index_metadata",

x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStoreTests.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1698,7 +1698,8 @@ public void testKibanaSystemRole() {
16981698

16991699
Arrays.asList(
17001700
"logs-m365_defender.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1701-
"logs-microsoft_defender_endpoint.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13))
1701+
"logs-microsoft_defender_endpoint.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1702+
"logs-microsoft_defender_cloud.assessment-" + randomAlphaOfLength(randomIntBetween(0, 13))
17021703
).forEach(indexName -> {
17031704
final IndexAbstraction indexAbstraction = mockIndexAbstraction(indexName);
17041705
assertThat(kibanaRole.indices().allowedIndicesMatcher("indices:foo").test(indexAbstraction), is(false));

0 commit comments

Comments
 (0)