Skip to content

Commit 5ef1739

Browse files
add missing duplicate pages
1 parent 392206b commit 5ef1739

12 files changed

+111
-23
lines changed

docs/serverless/cloud-native-security/benchmark-rules.asciidoc

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,10 @@
44
:description: Review the cloud security benchmark rules used by the CSPM and KSPM integrations.
55
:keywords: serverless, security, overview, cloud security
66

7+
:append:
8+
9+
// tag::content[]
10+
711
preview:[]
812

913
The Benchmarks page lets you view the cloud security posture (CSP) benchmarks for the <<security-cspm,Cloud security posture management>> (CSPM) and <<security-kspm,Kubernetes security posture management>> (KSPM) integrations.
@@ -12,7 +16,7 @@ The Benchmarks page lets you view the cloud security posture (CSP) benchmarks fo
1216
image::images/benchmark-rules/-cloud-native-security-benchmark-rules.png[Benchmark rules page]
1317

1418
[discrete]
15-
[[security-benchmark-rules-what-are-benchmarks]]
19+
[id="security-benchmark-rules-what-are-benchmarks{append}"]
1620
== What are benchmarks?
1721

1822
Each benchmark contains benchmark rules which are used by the CSPM and KSPM integrations to identify configuration risks in your cloud infrastructure. There are different benchmarks for different cloud services, such as AWS, GCP, or Azure. They are based on the Center for Internet Security's (CIS) https://www.cisecurity.org/cis-benchmarks/[secure configuration benchmarks].
@@ -32,7 +36,7 @@ Benchmark rules are not editable.
3236
====
3337

3438
[discrete]
35-
[[security-benchmark-rules-review-your-benchmarks]]
39+
[id="security-benchmark-rules-review-your-benchmarks{append}"]
3640
== Review your benchmarks
3741

3842
To access your active benchmarks, go to **Rules -> Benchmarks**. From there, you can click a benchmark's name to view the benchmark rules associated with it. You can click a benchmark rule's name to see details including information about how to remediate it, and related links.
@@ -45,9 +49,13 @@ Disabling a benchmark rule automatically disables any associated detection rules
4549
====
4650

4751
[discrete]
48-
[[security-benchmark-rules-how-benchmark-rules-work]]
52+
[id="security-benchmark-rules-how-benchmark-rules-work{append}"]
4953
== How benchmark rules work
5054

5155
. When a security posture management integration is deployed, and every four hours after that, {agent} fetches relevant cloud resources.
5256
. After resources are fetched, they are evaluated against all applicable enabled benchmark rules.
5357
. Finding values of `pass` or `fail` indicate whether the standards defined by benchmark rules were met.
58+
59+
// end::content[]
60+
61+
:append!:
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
:append: -cspm
2+
3+
[id="security-cloud-posture-dashboard-dash{append}"]
4+
= Cloud Security Posture dashboard
5+
6+
include::../dashboards/cloud-posture-dashboard-dash.asciidoc[tag=content]
7+
8+
:append!:

docs/serverless/cloud-native-security/cspm-findings-page.asciidoc

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,10 @@
44
:description: Review your cloud security posture management data.
55
:keywords: serverless, security, overview, cloud security
66

7+
:append:
8+
9+
// tag::content[]
10+
711
preview:[]
812

913
The **Misconfigurations** tab on the Findings page displays the configuration risks identified by the <<security-cspm,CSPM>> and <<security-kspm,KSPM>> integrations.
@@ -12,19 +16,19 @@ The **Misconfigurations** tab on the Findings page displays the configuration ri
1216
image::images/findings-page/-cloud-native-security-findings-page.png[Findings page]
1317

1418
[discrete]
15-
[[cspm-findings-page-what-are-findings]]
19+
[id="cspm-findings-page-what-are-findings{append}"]
1620
== What are CSPM and KSPM findings?
1721

1822
CSPM and KSPM findings indicate whether a given resource passed or failed evaluation against a specific security guideline. Each finding includes metadata about the resource evaluated and the security guideline used to evaluate it. Each finding's result (`pass` or `fail`) indicates whether a particular part of your infrastructure meets a security guideline.
1923

2024
[discrete]
21-
[[cspm-findings-page-group-filter]]
25+
[id="cspm-findings-page-group-filter{append}"]
2226
== Group and filter findings
2327

2428
By default, the Findings page lists all findings, without grouping or filtering.
2529

2630
[discrete]
27-
[[security-cspm-findings-page-group-findings]]
31+
[id="security-cspm-findings-page-group-findings{append}"]
2832
=== Group findings
2933

3034
Click **Group findings by** to group your data by a field. Select one of the suggested fields or **Custom field** to choose your own. You can select up to three group fields at once.
@@ -38,7 +42,7 @@ Multiple groupings apply to your data in the order you selected them. For exampl
3842
====
3943

4044
[discrete]
41-
[[cspm-findings-page-filter-findings]]
45+
[id="cspm-findings-page-filter-findings{append}"]
4246
=== Filter findings
4347

4448
You can filter findings data in two ways:
@@ -47,7 +51,7 @@ You can filter findings data in two ways:
4751
* **In-table value filters**: Hover over a finding to display available inline actions. Use the **Filter In** (plus) and **Filter Out** (minus) buttons.
4852

4953
[discrete]
50-
[[security-cspm-findings-page-customize-the-findings-table]]
54+
[id="security-cspm-findings-page-customize-the-findings-table{append}"]
5155
== Customize the Findings table
5256

5357
You can use the toolbar buttons in the upper-left of the Findings table to select which columns appear:
@@ -62,12 +66,12 @@ You can also click a column's name to open a menu that allows you to perform mul
6266
====
6367

6468
[discrete]
65-
[[cspm-findings-page-remediate-findings]]
69+
[id="cspm-findings-page-remediate-findings{append}"]
6670
== Remediate failed findings
6771

6872
To remediate failed findings and reduce your attack surface:
6973

70-
. First, <<cspm-findings-page-filter-findings,filter for failed findings>>.
74+
. First, <<cspm-findings-page-filter-findings{append},filter for failed findings>>.
7175
. Click the arrow to the left of a failed finding to open the findings flyout.
7276
. Follow the steps under **Remediation**.
7377
+
@@ -77,11 +81,15 @@ Remediation steps typically include commands for you to execute. These sometimes
7781
====
7882

7983
[discrete]
80-
[[cspm-create-rule-from-finding]]
84+
[id="cspm-create-rule-from-finding{append}"]
8185
== Generate alerts for failed Findings
8286

8387
You can create detection rules that detect specific failed findings directly from the Findings page.
8488

8589
. Click the arrow to the left of a Finding to open the findings flyout.
8690
. Click **Take action**, then **Create a detection rule**. This automatically creates a detection rule that creates alerts when the associated benchmark rule generates a failed finding.
8791
. To review or customize the new rule, click **View rule**.
92+
93+
// end::content[]
94+
95+
:append!:
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
:append: -d4c
2+
3+
[id="security-kubernetes-dashboard-dash{append}"]
4+
= Kubernetes dashboard
5+
6+
include::../dashboards/kubernetes-dashboard-dash.asciidoc[tag=content]
7+
8+
:append!:
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
:append: -kspm
2+
3+
[id="security-benchmark-rules{append}"]
4+
= Benchmarks
5+
6+
include::./benchmark-rules.asciidoc[tag=content]
7+
8+
:append!:
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
:append: -kspm
2+
3+
[id="security-cloud-posture-dashboard-dash{append}"]
4+
= Cloud Security Posture dashboard
5+
6+
include::../dashboards/cloud-posture-dashboard-dash.asciidoc[tag=content]
7+
8+
:append!:
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
:append: -kspm
2+
3+
[id="security-cspm-findings-page-kspm{append}"]
4+
= Findings page
5+
6+
include::./cspm-findings-page.asciidoc[tag=content]
7+
8+
:append!:
Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
:append: -2
2+
3+
[id="security-kubernetes-dashboard-dash{append}"]
4+
= Kubernetes dashboard
5+
6+
include::../dashboards/vuln-management-dashboard-dash.asciidoc[tag=content]
7+
8+
:append!:

docs/serverless/dashboards/cloud-posture-dashboard-dash.asciidoc

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,10 @@
44
:description: The Cloud Security Posture dashboard summarizes your cloud infrastructure's performance on CIS security benchmarks.
55
:keywords: serverless, security, overview, cloud security
66

7+
:append:
8+
9+
// tag::content[]
10+
711
++++
812
<titleabbrev>Cloud Security Posture</titleabbrev>
913
++++
@@ -22,7 +26,7 @@ The Cloud Security Posture dashboard shows:
2226
* Configuration risks grouped by CIS section (security guideline category)
2327

2428
[discrete]
25-
[[cloud-posture-dashboard-UI]]
29+
[id="cloud-posture-dashboard-UI{append}"]
2630
== Cloud Security Posture dashboard UI
2731

2832
At the top of the dashboard, you can switch between the Cloud accounts and Kubernetes cluster views.
@@ -37,7 +41,7 @@ Below the summary section, each row shows the CSP for a benchmark that applies t
3741
image::images/cloud-posture-dashboard/-dashboards-cloud-sec-dashboard-individual-row.png[A row representing a single cluster in the Cloud Security Posture dashboard]
3842

3943
[discrete]
40-
[[cloud-posture-dashboard-faq]]
44+
[id="cloud-posture-dashboard-faq{append}"]
4145
== FAQ (Frequently Asked Questions)
4246

4347
.When do newly-enrolled clusters appear on the dashboard?
@@ -51,3 +55,7 @@ It can take up to 10 minutes for deployment, resource fetching, evaluation, and
5155
=====
5256
A cluster will disappear as soon as the KSPM integration fetches data while that cluster is not enrolled. The fetch process repeats every four hours, which means a newly unenrolled cluster can take a maximum of four hours to disappear from the dashboard.
5357
=====
58+
59+
// end::content[]
60+
61+
:append!:

docs/serverless/dashboards/kubernetes-dashboard-dash.asciidoc

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,10 @@
44
:description: The Kubernetes dashboard provides insight into Linux process data from your Kubernetes clusters.
55
:keywords: serverless, security, overview, cloud security
66

7+
:append:
8+
9+
// tag::content[]
10+
711
++++
812
<titleabbrev>Kubernetes</titleabbrev>
913
++++
@@ -43,7 +47,7 @@ The **Metadata** tab is organized into these expandable sections:
4347
* **Orchestrator:** `resource.ip`, `resource.name`, `resource.type`, `namespace`, `cluster.id`, `cluster.name`, `parent.type`
4448

4549
[discrete]
46-
[[k8s-dash-setup]]
50+
[id="k8s-dash-setup{append}"]
4751
== Setup
4852

4953
To get data for this dashboard, set up <<security-d4c-get-started,Cloud Workload Protection for Kubernetes>> for the clusters you want to display on the dashboard.
@@ -101,3 +105,7 @@ This feature is currently available on GKE and EKS using Linux hosts and Kuberne
101105
====
102106
This dashboard uses data from the `logs-*` index pattern, which is included by default in the <<security-advanced-settings,`securitySolution:defaultIndex` advanced setting>>. To collect data from multiple {es} clusters (as in a cross-cluster deployment), update `logs-*` to `*:logs-*`.
103107
====
108+
109+
// end::content[]
110+
111+
:append!:

0 commit comments

Comments
 (0)