Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 6 additions & 0 deletions docs/changelog/133793.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
pr: 133793
summary: "[Sentinel One] Add `manage`, `create_index`, `read`, `index`, `write`, `delete`, permission for third party agent indices `kibana_system`"
area: Authorization
type: enhancement
issues:
- 133703
Original file line number Diff line number Diff line change
Expand Up @@ -539,7 +539,8 @@ static RoleDescriptor kibanaSystem(String name) {
.indices(
"logs-m365_defender.vulnerability-*",
"logs-microsoft_defender_endpoint.vulnerability-*",
"logs-microsoft_defender_cloud.assessment-*"
"logs-microsoft_defender_cloud.assessment-*",
"logs-sentinel_one.application_risk-*"
)
.privileges(
"read",
Expand All @@ -548,10 +549,11 @@ static RoleDescriptor kibanaSystem(String name) {
TransportDeleteIndexAction.TYPE.name()
)
.build(),
// For ExtraHop and QualysGAV specific actions. Kibana reads, writes and manages this index
// For ExtraHop, QualysGAV, and SentinelOne Application Dataset specific actions. Kibana reads, writes and manages this
// index
// for configured ILM policies.
RoleDescriptor.IndicesPrivileges.builder()
.indices("logs-extrahop.investigation-*", "logs-qualys_gav.asset-*")
.indices("logs-extrahop.investigation-*", "logs-qualys_gav.asset-*", "logs-sentinel_one.application-*")
.privileges(
"manage",
"create_index",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1773,7 +1773,8 @@ public void testKibanaSystemRole() {
Arrays.asList(
"logs-m365_defender.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
"logs-microsoft_defender_endpoint.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
"logs-microsoft_defender_cloud.assessment-" + randomAlphaOfLength(randomIntBetween(0, 13))
"logs-microsoft_defender_cloud.assessment-" + randomAlphaOfLength(randomIntBetween(0, 13)),
"logs-sentinel_one.application_risk-" + randomAlphaOfLength(randomIntBetween(0, 13))
).forEach(indexName -> {
final IndexAbstraction indexAbstraction = mockIndexAbstraction(indexName);
assertThat(kibanaRole.indices().allowedIndicesMatcher("indices:foo").test(indexAbstraction), is(false));
Expand Down Expand Up @@ -1975,11 +1976,12 @@ public void testKibanaSystemRole() {
assertThat(kibanaRole.indices().allowedIndicesMatcher(RolloverAction.NAME).test(indexAbstraction), is(true));
});

// Tests for third-party agent indices (ExtraHop, QualysGAV) that `kibana_system` has full management access to
// Tests for third-party agent indices (ExtraHop, QualysGAV, SentinelOne) that `kibana_system` has full management access to
// This includes read, write, create, delete, and all ILM-related management actions.
Arrays.asList(
"logs-extrahop.investigation-" + randomAlphaOfLength(randomIntBetween(1, 10)),
"logs-qualys_gav.asset-" + randomAlphaOfLength(randomIntBetween(1, 10))
"logs-qualys_gav.asset-" + randomAlphaOfLength(randomIntBetween(1, 10)),
"logs-sentinel_one.application-" + randomAlphaOfLength(randomIntBetween(1, 10))
).forEach((index_qualys_extra_hop) -> {
final IndexAbstraction indexAbstraction = mockIndexAbstraction(index_qualys_extra_hop);

Expand Down