Skip to content

Commit 8b0c310

Browse files
Merge branch 'main' into issue-6254-closed-alerts
2 parents 5bacbe9 + a74bc31 commit 8b0c310

File tree

184 files changed

+318
-3917
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

184 files changed

+318
-3917
lines changed

.mergify.yml

Lines changed: 0 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,6 @@ pull_request_rules:
2929
- name: backport patches to 8.x branch
3030
conditions:
3131
- merged
32-
- base=main
3332
- label=v8.18.0
3433
actions:
3534
backport:
@@ -43,7 +42,6 @@ pull_request_rules:
4342
- name: backport patches to 8.17 branch
4443
conditions:
4544
- merged
46-
- base=main
4745
- label=v8.17.0
4846
actions:
4947
backport:
@@ -57,7 +55,6 @@ pull_request_rules:
5755
- name: backport patches to 8.16 branch
5856
conditions:
5957
- merged
60-
- base=main
6158
- label=v8.16.0
6259
actions:
6360
backport:
@@ -71,7 +68,6 @@ pull_request_rules:
7168
- name: backport patches to 8.15 branch
7269
conditions:
7370
- merged
74-
- base=main
7571
- label=v8.15.0
7672
actions:
7773
backport:
@@ -85,7 +81,6 @@ pull_request_rules:
8581
- name: backport patches to 8.14 branch
8682
conditions:
8783
- merged
88-
- base=main
8984
- label=v8.14.0
9085
actions:
9186
backport:
@@ -99,7 +94,6 @@ pull_request_rules:
9994
- name: backport patches to 8.13 branch
10095
conditions:
10196
- merged
102-
- base=main
10397
- label=v8.13.0
10498
actions:
10599
backport:
@@ -113,7 +107,6 @@ pull_request_rules:
113107
- name: backport patches to 8.12 branch
114108
conditions:
115109
- merged
116-
- base=main
117110
- label=v8.12.0
118111
actions:
119112
backport:
@@ -127,7 +120,6 @@ pull_request_rules:
127120
- name: backport patches to 8.11 branch
128121
conditions:
129122
- merged
130-
- base=main
131123
- label=v8.11.0
132124
actions:
133125
backport:
@@ -141,7 +133,6 @@ pull_request_rules:
141133
- name: backport patches to 8.10 branch
142134
conditions:
143135
- merged
144-
- base=main
145136
- label=v8.10.0
146137
actions:
147138
backport:
@@ -155,7 +146,6 @@ pull_request_rules:
155146
- name: backport patches to 8.9 branch
156147
conditions:
157148
- merged
158-
- base=main
159149
- label=v8.9.0
160150
actions:
161151
backport:
@@ -169,7 +159,6 @@ pull_request_rules:
169159
- name: backport patches to 8.8 branch
170160
conditions:
171161
- merged
172-
- base=main
173162
- label=v8.8.0
174163
actions:
175164
backport:
@@ -183,7 +172,6 @@ pull_request_rules:
183172
- name: backport patches to 8.7 branch
184173
conditions:
185174
- merged
186-
- base=main
187175
- label=v8.7.0
188176
actions:
189177
backport:
@@ -197,7 +185,6 @@ pull_request_rules:
197185
- name: backport patches to 8.6 branch
198186
conditions:
199187
- merged
200-
- base=main
201188
- label=v8.6.0
202189
actions:
203190
backport:
@@ -211,7 +198,6 @@ pull_request_rules:
211198
- name: backport patches to 8.5 branch
212199
conditions:
213200
- merged
214-
- base=main
215201
- label=v8.5.0
216202
actions:
217203
backport:
@@ -225,7 +211,6 @@ pull_request_rules:
225211
- name: backport patches to 8.4 branch
226212
conditions:
227213
- merged
228-
- base=main
229214
- label=v8.4.0
230215
actions:
231216
backport:
@@ -239,7 +224,6 @@ pull_request_rules:
239224
- name: backport patches to 8.3 branch
240225
conditions:
241226
- merged
242-
- base=main
243227
- label=v8.3.0
244228
actions:
245229
backport:
@@ -253,7 +237,6 @@ pull_request_rules:
253237
- name: backport patches to 8.2 branch
254238
conditions:
255239
- merged
256-
- base=main
257240
- label=v8.2.0
258241
actions:
259242
backport:
@@ -267,7 +250,6 @@ pull_request_rules:
267250
- name: backport patches to 8.1 branch
268251
conditions:
269252
- merged
270-
- base=main
271253
- label=v8.1.0
272254
actions:
273255
backport:
@@ -281,7 +263,6 @@ pull_request_rules:
281263
- name: backport patches to 7.17 branch
282264
conditions:
283265
- merged
284-
- base=main
285266
- label=v7.17.0
286267
actions:
287268
backport:

docs/AI-for-security/llm-performance-matrix.asciidoc

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,15 @@
33

44
This table describes the performance of various large language models (LLMs) for different use cases in {elastic-sec}, based on our internal testing. To learn more about these use cases, refer to <<attack-discovery, Attack discovery>> or <<security-assistant, AI Assistant>>.
55

6-
[cols="1,1,1,1,1,1,1,1", options="header"]
6+
[cols="1,1,1,1,1,1,1,1,1,1", options="header"]
77
|===
8-
| *Feature* | *Model* | | | | | |
9-
| | *Claude 3: Opus* | *Claude 3.5: Sonnet* | *Claude 3: Haiku* | *GPT-4o* | *GPT-4 Turbo* | **Gemini 1.5 Pro ** | **Gemini 1.5 Flash**
10-
| *Assistant - General* | Excellent | Excellent | Excellent | Excellent | Excellent | Excellent | Excellent
11-
| *Assistant - {esql} generation*| Great | Great | Poor | Excellent | Poor | Good | Poor
12-
| *Assistant - Alert questions* | Excellent | Excellent | Excellent | Excellent | Poor | Excellent | Good
13-
| *Attack discovery* | Excellent | Excellent | Poor | Poor | Good | Great | Poor
8+
| *Feature* | *Model* | | | | | | | |
9+
| | *Claude 3: Opus*| *Claude 3.5: Sonnet v2* | *Claude 3.5: Sonnet* | *Claude 3.5: Haiku*| *Claude 3: Haiku* | *GPT-4o* | *GPT-4o-mini* | **Gemini 1.5 Pro 002** | **Gemini 1.5 Flash 002**
10+
| *Assistant - General* | Excellent | Excellent | Excellent | Excellent | Excellent | Excellent | Excellent | Excellent | Excellent
11+
| *Assistant - {esql} generation*| Excellent | Excellent | Excellent | Excellent | Excellent | Excellent | Great | Excellent | Poor
12+
| *Assistant - Alert questions* | Excellent | Excellent | Excellent | Excellent | Excellent | Excellent | Great | Excellent | Good
13+
| *Assistant - Knowledge retrieval* | Good | Excellent | Excellent | Excellent | Excellent | Excellent | Great | Excellent | Excellent
14+
| *Attack Discovery* | Great | Great | Excellent | Poor | Poor | Great | Poor | Excellent | Poor
1415
|===
15-
16+
17+
NOTE: `Excellent` is the best rating, followed by `Great`, then by `Good`, and finally by `Poor`.

docs/cloud-native-security/cloud-native-security-index.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ include::cspm.asciidoc[leveloffset=+1]
4141
include::cspm-get-started-aws.asciidoc[leveloffset=+2]
4242
include::cspm-get-started-gcp.asciidoc[leveloffset=+2]
4343
include::cspm-get-started-azure.asciidoc[leveloffset=+2]
44+
include::cspm-permissions.asciidoc[leveloffset=+2]
4445
include::cspm-findings.asciidoc[leveloffset=+2]
4546
include::cspm-benchmark-rules.asciidoc[leveloffset=+2]
4647
include::cspm-cloud-posture-dashboard.asciidoc[leveloffset=+2]

docs/cloud-native-security/cspm-get-started-aws.asciidoc

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,10 @@ This page explains how to get started monitoring the security posture of your cl
1010
.Requirements
1111
[sidebar]
1212
--
13+
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1314
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1415
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1516
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
16-
* `Read` privileges for the following {es} indices:
17-
** `logs-cloud_security_posture.findings_latest-*`
18-
** `logs-cloud_security_posture.scores-*`
19-
* The following {kib} privileges:
20-
** Security: `Read`
21-
** Integrations: `Read`
22-
** Saved Objects Management: `Read`
23-
** Fleet: `All`
2417
* The user who gives the CSPM integration AWS permissions must be an AWS account `admin`.
2518
--
2619

docs/cloud-native-security/cspm-get-started-azure.asciidoc

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,10 @@ This page explains how to get started monitoring the security posture of your cl
1010
.Requirements
1111
[sidebar]
1212
--
13+
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1314
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1415
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1516
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
16-
* `Read` privileges for the following {es} indices:
17-
** `logs-cloud_security_posture.findings_latest-*`
18-
** `logs-cloud_security_posture.scores-*`
19-
* The following {kib} privileges:
20-
** Security: `Read`
21-
** Integrations: `Read`
22-
** Saved Objects Management: `Read`
23-
** Fleet: `All`
2417
* The user who gives the CSPM integration permissions in Azure must be an Azure subscription `admin`.
2518
--
2619

docs/cloud-native-security/cspm-get-started-gcp.asciidoc

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,10 @@ This page explains how to get started monitoring the security posture of your GC
1010
.Requirements
1111
[sidebar]
1212
--
13+
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1314
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1415
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1516
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
16-
* `Read` privileges for the following {es} indices:
17-
** `logs-cloud_security_posture.findings_latest-*`
18-
** `logs-cloud_security_posture.scores-*`
19-
* The following {kib} privileges:
20-
** Security: `Read`
21-
** Integrations: `Read`
22-
** Saved Objects Management: `Read`
23-
** Fleet: `All`
2417
* The user who gives the CSPM integration GCP permissions must be a GCP project `admin`.
2518
--
2619

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
[[cspm-required-permissions]]
2+
= CSPM privilege requirements
3+
4+
This page lists required privileges for {elastic-sec}'s CSPM features. There are three access levels: read, write, and manage. Each access level and its requirements are described below.
5+
6+
[discrete]
7+
== Read
8+
9+
Users with these minimum permissions can view data on the **Findings** page and the Cloud Posture dashboard.
10+
11+
[discrete]
12+
=== {es} index privileges
13+
`Read` privileges for the following {es} indices:
14+
15+
* `logs-cloud_security_posture.findings_latest-*`
16+
* `logs-cloud_security_posture.scores-*`
17+
18+
[discrete]
19+
=== {kib} privileges
20+
21+
* `Security: Read`
22+
23+
24+
[discrete]
25+
== Write
26+
27+
Users with these minimum permissions can view data on the **Findings** page and the Cloud Posture dashboard, create detection rules from the findings details flyout, and enable or disable benchmark rules.
28+
29+
[discrete]
30+
=== {es} index privileges
31+
`Read` privileges for the following {es} indices:
32+
33+
* `logs-cloud_security_posture.findings_latest-*`
34+
* `logs-cloud_security_posture.scores-*`
35+
36+
[discrete]
37+
=== {kib} privileges
38+
39+
* `Security: All`
40+
41+
42+
[discrete]
43+
== Manage
44+
45+
Users with these minimum permissions can view data on the **Findings** page and the Cloud Posture dashboard, create detection rules from the findings details flyout, enable or disable benchmark rules, and install, update, or uninstall CSPM integrations and assets.
46+
47+
[discrete]
48+
=== {es} index privileges
49+
`Read` privileges for the following {es} indices:
50+
51+
* `logs-cloud_security_posture.findings_latest-*`
52+
* `logs-cloud_security_posture.scores-*`
53+
54+
[discrete]
55+
=== {kib} privileges
56+
57+
* `Security: All`
58+
* `Spaces: All`
59+
* `Fleet: All`
60+
* `Integrations: All`
61+

docs/cloud-native-security/environment-variable-capture.asciidoc

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,6 @@ To set up environment variable capture for an {agent} policy:
2828
. Enter the names of env vars you want to capture, separated by commas. For example: `PATH,USER`
2929
. Click *Save*.
3030

31-
[role="screenshot"]
32-
image::images/env-var-capture.png[The "linux.advanced.capture_env_vars" advanced agent policy setting]
33-
3431
[[find-cap-env-vars]]
3532
[discrete]
3633
== Find captured environment variables
-33 KB
Binary file not shown.

docs/detections/detection-engine-intro.asciidoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -167,3 +167,9 @@ and you should contact your {kib} administrator.
167167
NOTE: For *self-managed* {stack} deployments only, this message may be
168168
displayed when the <<detections-permissions, `xpack.security.enabled`>>
169169
setting is not enabled in the `elasticsearch.yml` file. For more information, refer to <<detections-on-prem-requirements>>.
170+
171+
[discrete]
172+
[[detections-logsdb-index-mode]]
173+
== Using logsdb index mode
174+
175+
To learn how your rules and alerts are affected by using the {ref}/logs-data-stream.html[logsdb index mode], refer to <<detections-logsdb-index-mode-impact>>.

0 commit comments

Comments
 (0)