Skip to content

Commit 8c5c0d6

Browse files
committed
adds information about 3p workflows to cloud native sec section
1 parent 63a1854 commit 8c5c0d6

9 files changed

+51
-9
lines changed
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
[[ingest-aws-securityhub-data]]
2+
= Ingest AWS Security Hub data
3+
4+
In order to enrich your {elastic-sec} workflows with third-party cloud security posture data collected by AWS Security Hub:
5+
6+
* Follow the steps to {integrations-docs}/aws/securityhub[set up the AWS Security Hub integration].
7+
8+
* Make sure the integration version is at least xx.xx.
9+
10+
* Ensure you have `read` privileges for the following indices: `security_solution-*.misconfiguration_latest`, `security_solution-*.vulnerability_latest`.
11+
12+
After you've completed these steps, AWS Security Hub data will appear on the <<cspm-findings-page, Findings>> page, on the <<cspm-posture-dashboard, Cloud Posture dashboard>>, and in the entity details flyouts for <<insights-section, alerts>>, <<user-details-flyout,users>>, and <<host-details-flyout,hosts>>.

docs/cloud-native-security/cloud-native-security-index.asciidoc

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,4 +68,6 @@ include::cloud-workload-protection.asciidoc[leveloffset=+1]
6868
include::environment-variable-capture.asciidoc[leveloffset=+1]
6969

7070
include::ingest-cncf-data.asciidoc[leveloffset=+1]
71-
include::falco-setup.asciidoc[leveloffset=+2]
71+
include::falco-setup.asciidoc[leveloffset=+2]
72+
include::aws-securityhub.asciidoc[leveloffset=+2]
73+
include::wiz.asciidoc[leveloffset=+2]

docs/cloud-native-security/cspm-cloud-posture-dashboard.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
= Cloud Security Posture dashboard
55

6-
The Cloud Security Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To get started monitoring your security posture, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.
6+
The Cloud Security Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To get started monitoring your security posture, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>>, <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>, or <<ingest-third-party-cloud-security-data>>.
77

88
[role="screenshot"]
99
image::images/cloud-sec-dashboard.png[The cloud Security dashboard]

docs/cloud-native-security/cspm-findings.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
[[cspm-findings-page]]
22
= Findings page
33

4-
The **Misconfigurations** tab on the Findings page displays the configuration risks identified by the <<cspm,CSPM>> and <<kspm,KSPM>> integrations.
4+
The **Misconfigurations** tab on the Findings page displays the configuration risks identified by the <<cspm,CSPM>> and <<kspm,KSPM>> integrations, as well as data from <<ingest-third-party-cloud-security-data, third-party integrations>>.
55

66
[role="screenshot"]
77
image::images/findings-page.png[Findings page]
Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,22 @@
1-
[[ingest-third-party-cncf]]
1+
[[ingest-third-party-cloud-security-data]]
22
= Ingest third-party cloud security data
33

4-
This section describes how to ingest cloud security data from third-party tools into {es}.
4+
This section describes how to ingest cloud security data from third-party tools into {es}. Once ingested, this data can provide additional context and enrich your {elastic-sec} workflows.
55

6-
Learn to <<ingest-falco, ingest data from Sysdig Falco>>.
6+
You can ingest both third party cloud workload protection data and third party security posture and vulnerability data.
7+
8+
[discrete]
9+
== Ingest third-party workload protection data
10+
11+
You can ingest third-party cloud security alerts into {elastic-sec} to view them on the <<alerts-page>> and incorporate them into your triage and threat hunting workflows.
12+
13+
* Learn to <<ingest-falco, ingest alerts from Sysdig Falco>>.
14+
15+
[discrete]
16+
== Ingest third-party security posture and vulnerability data
17+
18+
You can ingest third-party data into {elastic-sec} to review and investigate it alongside data collected by {elastic-sec}'s native cloud security integrations. Once ingested, cloud security posture and vulnerability data appears on the <<cspm-findings-page,Findings>> page, on the <<cspm-posture-dashboard, Cloud Posture dashboard>>, and in the entity details flyouts for <<insights-section, alerts>>, <<user-details-flyout,users>>, and <<host-details-flyout,hosts>>.
19+
20+
* Learn to <<ingest-aws-securityhub-data, ingest cloud security posture data from AWS Security Hub>>.
21+
22+
* Learn to <<ingest-wiz-data, ingest cloud security posture and vulnerability data from Wiz>>.

docs/cloud-native-security/vuln-management-dashboard.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ image::images/vuln-management-dashboard.png[The CNVM dashboard]
1414
.Requirements
1515
[sidebar]
1616
--
17-
* To collect this data, install the <<vuln-management-get-started, Cloud Native Vulnerability Management>> integration.
17+
* To collect this data, install the <<vuln-management-get-started, Cloud Native Vulnerability Management>> integration or <<ingest-third-party-cloud-security-data,start collecting third-party vulnerability data>>.
1818
* The CNVM dashboard is available to all Elastic Cloud users. For on-premises deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
1919
--
2020

docs/cloud-native-security/vuln-management-findings.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
[[vuln-management-findings]]
22
= Findings page
33

4-
The **Vulnerabilities** tab on the Findings page displays the vulnerabilities detected by the <<vuln-management-overview, CNVM integration>>.
4+
The **Vulnerabilities** tab on the Findings page displays the vulnerabilities detected by the <<vuln-management-overview, CNVM integration>>, as well as those identified by <<ingest-third-party-cloud-security-data, third-party integrations>>.
55

66
image::images/cnvm-findings-page.png[The Vulnerabilities tab of the Findings page]
77

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
[[ingest-wiz-data]]
2+
= Ingest Wiz data
3+
4+
In order to enrich your {elastic-sec} workflows with third-party cloud security posture and vulnerability data collected by Wiz:
5+
6+
* Follow the steps to {integrations-docs}/wiz[set up the Wiz integration].
7+
8+
* Make sure the integration version is at least xx.xx.
9+
10+
* Ensure you have `read` privileges for the following indices: `security_solution-*.misconfiguration_latest`, `security_solution-*.vulnerability_latest`.
11+
12+
After you've completed these steps, Wiz data will appear on the <<cspm-findings-page, Misconfiguration Findings>> page, the <<cnvm-findings-page, Vulnerabilities Findings>> page, on the <<cspm-posture-dashboard, Cloud Posture dashboard>>, and in the entity details flyouts for <<insights-section, alerts>>, <<user-details-flyout,users>>, and <<host-details-flyout,hosts>>.

docs/dashboards/cloud-posture.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
// Note: This page is intentionally duplicated by docs/cloud-native-security/cloud-nat-sec-posture.asciidoc. When you update this page, update that page to match. And careful with the anchor links because they should not match.
33

44
= Cloud Security Posture dashboard
5-
The Cloud Security Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To start collecting this data, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.
5+
The Cloud Security Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To get started monitoring your security posture, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>>, <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>, or <<ingest-third-party-cloud-security-data>>.
66

77
[role="screenshot"]
88
image::images/cloud-sec-dashboard.png[The cloud Security dashboard]

0 commit comments

Comments
 (0)