Skip to content

Conversation

@paul-tavares
Copy link
Contributor

Description

  • Adds read privilege to the kibana_system role for indexes associated with the Microsoft Defender Integrations
    • Changes are necessary in order to support Security Solution bi-directional response actions

@paul-tavares paul-tavares self-assigned this Apr 14, 2025
@paul-tavares paul-tavares requested a review from a team as a code owner April 14, 2025 21:17
@elasticsearchmachine elasticsearchmachine added needs:triage Requires assignment of a team area label external-contributor Pull request authored by a developer outside the Elasticsearch team labels Apr 14, 2025
@paul-tavares paul-tavares added the Team:Security Meta label for security team label Apr 14, 2025
@elasticsearchmachine elasticsearchmachine removed the Team:Security Meta label for security team label Apr 14, 2025
@kc13greiner kc13greiner self-requested a review April 15, 2025 02:21
Copy link
Contributor

@kc13greiner kc13greiner left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

New data index read privileges LGTM!

Reasoning: Usually data indices are not allowed to be read by kibana_system, but logs-* are known, documented collision pattern and an exception is made for these patterns

@paul-tavares paul-tavares added >enhancement :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC labels Apr 15, 2025
@elasticsearchmachine elasticsearchmachine added Team:Security Meta label for security team and removed needs:triage Requires assignment of a team area label labels Apr 15, 2025
@elasticsearchmachine
Copy link
Collaborator

Hi @paul-tavares, I've created a changelog YAML for you.

@elasticsearchmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

Copy link
Member

@ashokaditya ashokaditya left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚀

@paul-tavares paul-tavares merged commit ad0c215 into elastic:main Apr 15, 2025
22 checks passed
@paul-tavares paul-tavares deleted the task/olm-12369-add-ms-defender-index-privileges branch April 15, 2025 19:42
afoucret pushed a commit to afoucret/elasticsearch that referenced this pull request Apr 16, 2025
…le for Microsoft Defender integration indexes (elastic#126803)

adds read privilege to the kibana_system role for indexes associated with the Microsoft Defender Integrations.
Changes are necessary in order to support Security Solution bi-directional response actions
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

>enhancement external-contributor Pull request authored by a developer outside the Elasticsearch team :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team v9.1.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants