Skip to content

Commit d16a27e

Browse files
authored
add CDR related data streams to kibana_system priviliges (#112655)
1 parent bb872e6 commit d16a27e

File tree

2 files changed

+22
-2
lines changed

2 files changed

+22
-2
lines changed

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -420,7 +420,19 @@ static RoleDescriptor kibanaSystem(String name) {
420420
// For source indices of the Cloud Detection & Response (CDR) packages that ships a
421421
// transform
422422
RoleDescriptor.IndicesPrivileges.builder()
423-
.indices("logs-wiz.vulnerability-*", "logs-wiz.cloud_configuration_finding-*", "logs-aws.securityhub_findings-*")
423+
.indices(
424+
"logs-wiz.vulnerability-*",
425+
"logs-wiz.cloud_configuration_finding-*",
426+
"logs-google_scc.finding-*",
427+
"logs-aws.securityhub_findings-*",
428+
"logs-aws.inspector-*",
429+
"logs-amazon_security_lake.findings-*",
430+
"logs-qualys_vmdr.asset_host_detection-*",
431+
"logs-tenable_sc.vulnerability-*",
432+
"logs-tenable_io.vulnerability-*",
433+
"logs-rapid7_insightvm.vulnerability-*",
434+
"logs-carbon_black_cloud.asset_vulnerability_summary-*"
435+
)
424436
.privileges("read", "view_index_metadata")
425437
.build(),
426438
// For alias indices of the Cloud Detection & Response (CDR) packages that ships a

x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStoreTests.java

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1612,7 +1612,15 @@ public void testKibanaSystemRole() {
16121612
Arrays.asList(
16131613
"logs-wiz.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
16141614
"logs-wiz.cloud_configuration_finding-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1615-
"logs-aws.securityhub_findings-" + randomAlphaOfLength(randomIntBetween(0, 13))
1615+
"logs-google_scc.finding-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1616+
"logs-aws.securityhub_findings-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1617+
"logs-aws.inspector-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1618+
"logs-amazon_security_lake.findings-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1619+
"logs-qualys_vmdr.asset_host_detection-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1620+
"logs-tenable_sc.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1621+
"logs-tenable_io.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1622+
"logs-rapid7_insightvm.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1623+
"logs-carbon_black_cloud.asset_vulnerability_summary-" + randomAlphaOfLength(randomIntBetween(0, 13))
16161624
).forEach(indexName -> {
16171625
final IndexAbstraction indexAbstraction = mockIndexAbstraction(indexName);
16181626
assertThat(kibanaRole.indices().allowedIndicesMatcher("indices:foo").test(indexAbstraction), is(false));

0 commit comments

Comments
 (0)