Skip to content

Commit d6daef0

Browse files
authored
[Cloud Security] Add privileges required for AWS SecurityHub related to CDR misconfiguration features (#112574)
Update `kibana_system` privileges to include the ones required for the Security Solution CDR Misconfiguration latest transform to work on AWS SecurityHub integration: - to read from source AWS SecurityHub Findings data stream as one of the data streams providing data for Cloud Detection & Response (CDR) features in Kibana. The destination and alias index privileges already added in #112456.
1 parent 8f07d60 commit d6daef0

File tree

3 files changed

+8
-2
lines changed

3 files changed

+8
-2
lines changed

docs/changelog/112574.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
pr: 112574
2+
summary: Add privileges required for CDR misconfiguration features to work on AWS SecurityHub integration
3+
area: Authorization
4+
type: enhancement
5+
issues: []

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -420,7 +420,7 @@ static RoleDescriptor kibanaSystem(String name) {
420420
// For source indices of the Cloud Detection & Response (CDR) packages that ships a
421421
// transform
422422
RoleDescriptor.IndicesPrivileges.builder()
423-
.indices("logs-wiz.vulnerability-*", "logs-wiz.cloud_configuration_finding-*")
423+
.indices("logs-wiz.vulnerability-*", "logs-wiz.cloud_configuration_finding-*", "logs-aws.securityhub_findings-*")
424424
.privileges("read", "view_index_metadata")
425425
.build(),
426426
// For alias indices of the Cloud Detection & Response (CDR) packages that ships a

x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStoreTests.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1611,7 +1611,8 @@ public void testKibanaSystemRole() {
16111611

16121612
Arrays.asList(
16131613
"logs-wiz.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1614-
"logs-wiz.cloud_configuration_finding-" + randomAlphaOfLength(randomIntBetween(0, 13))
1614+
"logs-wiz.cloud_configuration_finding-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1615+
"logs-aws.securityhub_findings-" + randomAlphaOfLength(randomIntBetween(0, 13))
16151616
).forEach(indexName -> {
16161617
final IndexAbstraction indexAbstraction = mockIndexAbstraction(indexName);
16171618
assertThat(kibanaRole.indices().allowedIndicesMatcher("indices:foo").test(indexAbstraction), is(false));

0 commit comments

Comments
 (0)