Skip to content

Commit edeafb6

Browse files
authored
Add Defender for Cloud to 3rd party integrations permissions required for transform (#133623) (#133798)
Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to #132445 (cherry picked from commit eb005b0)
1 parent 5f3fbaf commit edeafb6

File tree

2 files changed

+7
-2
lines changed

2 files changed

+7
-2
lines changed

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -484,7 +484,11 @@ static RoleDescriptor kibanaSystem(String name) {
484484
// For source indices of the Cloud Detection & Response (CDR) packages
485485
// that ships a transform and has ILM policy
486486
RoleDescriptor.IndicesPrivileges.builder()
487-
.indices("logs-m365_defender.vulnerability-*", "logs-microsoft_defender_endpoint.vulnerability-*")
487+
.indices(
488+
"logs-m365_defender.vulnerability-*",
489+
"logs-microsoft_defender_endpoint.vulnerability-*",
490+
"logs-microsoft_defender_cloud.assessment-*"
491+
)
488492
.privileges(
489493
"read",
490494
"view_index_metadata",

x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStoreTests.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1684,7 +1684,8 @@ public void testKibanaSystemRole() {
16841684

16851685
Arrays.asList(
16861686
"logs-m365_defender.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1687-
"logs-microsoft_defender_endpoint.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13))
1687+
"logs-microsoft_defender_endpoint.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1688+
"logs-microsoft_defender_cloud.assessment-" + randomAlphaOfLength(randomIntBetween(0, 13))
16881689
).forEach(indexName -> {
16891690
final IndexAbstraction indexAbstraction = mockIndexAbstraction(indexName);
16901691
assertThat(kibanaRole.indices().allowedIndicesMatcher("indices:foo").test(indexAbstraction), is(false));

0 commit comments

Comments
 (0)