Skip to content

Commit 94e5d6c

Browse files
authored
Add Defender for Cloud to 3rd party integrations permissions required for transform (#133623) (#133797)
Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to #132445 (cherry picked from commit eb005b0)
1 parent 4e2efb6 commit 94e5d6c

File tree

2 files changed

+7
-2
lines changed

2 files changed

+7
-2
lines changed

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -522,7 +522,11 @@ static RoleDescriptor kibanaSystem(String name) {
522522
// For source indices of the Cloud Detection & Response (CDR) packages
523523
// that ships a transform and has ILM policy
524524
RoleDescriptor.IndicesPrivileges.builder()
525-
.indices("logs-m365_defender.vulnerability-*", "logs-microsoft_defender_endpoint.vulnerability-*")
525+
.indices(
526+
"logs-m365_defender.vulnerability-*",
527+
"logs-microsoft_defender_endpoint.vulnerability-*",
528+
"logs-microsoft_defender_cloud.assessment-*"
529+
)
526530
.privileges(
527531
"read",
528532
"view_index_metadata",

x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStoreTests.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1717,7 +1717,8 @@ public void testKibanaSystemRole() {
17171717

17181718
Arrays.asList(
17191719
"logs-m365_defender.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1720-
"logs-microsoft_defender_endpoint.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13))
1720+
"logs-microsoft_defender_endpoint.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1721+
"logs-microsoft_defender_cloud.assessment-" + randomAlphaOfLength(randomIntBetween(0, 13))
17211722
).forEach(indexName -> {
17221723
final IndexAbstraction indexAbstraction = mockIndexAbstraction(indexName);
17231724
assertThat(kibanaRole.indices().allowedIndicesMatcher("indices:foo").test(indexAbstraction), is(false));

0 commit comments

Comments
 (0)