Skip to content

Commit d016fae

Browse files
mergify[bot]benironsidegithub-actions[bot]
authored
[8.17] Creates CSPM privileges standalone page (backport #6269) (#6320)
* Creates CSPM privileges standalone page (#6269) * Creates CSPM privileges standalone page * ports updates to serverless * Apply suggestions from code review Co-authored-by: natasha-moore-elastic <[email protected]> * Apply suggestions from code review Co-authored-by: Nastasha Solomon <[email protected]> --------- Co-authored-by: natasha-moore-elastic <[email protected]> Co-authored-by: Nastasha Solomon <[email protected]> (cherry picked from commit 51b58c2) # Conflicts: # docs/serverless/cloud-native-security/cspm-get-started-azure.asciidoc # docs/serverless/cloud-native-security/cspm-get-started-gcp.asciidoc # docs/serverless/cloud-native-security/cspm-get-started.asciidoc # docs/serverless/index.asciidoc * Delete docs/serverless directory and its contents --------- Co-authored-by: Benjamin Ironside Goldstein <[email protected]> Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
1 parent 685793e commit d016fae

File tree

5 files changed

+65
-24
lines changed

5 files changed

+65
-24
lines changed

docs/cloud-native-security/cloud-native-security-index.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ include::cspm.asciidoc[leveloffset=+1]
4141
include::cspm-get-started-aws.asciidoc[leveloffset=+2]
4242
include::cspm-get-started-gcp.asciidoc[leveloffset=+2]
4343
include::cspm-get-started-azure.asciidoc[leveloffset=+2]
44+
include::cspm-permissions.asciidoc[leveloffset=+2]
4445
include::cspm-findings.asciidoc[leveloffset=+2]
4546
include::cspm-benchmark-rules.asciidoc[leveloffset=+2]
4647
include::cspm-cloud-posture-dashboard.asciidoc[leveloffset=+2]

docs/cloud-native-security/cspm-get-started-aws.asciidoc

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,10 @@ This page explains how to get started monitoring the security posture of your cl
1010
.Requirements
1111
[sidebar]
1212
--
13+
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1314
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1415
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1516
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
16-
* `Read` privileges for the following {es} indices:
17-
** `logs-cloud_security_posture.findings_latest-*`
18-
** `logs-cloud_security_posture.scores-*`
19-
* The following {kib} privileges:
20-
** Security: `Read`
21-
** Integrations: `Read`
22-
** Saved Objects Management: `Read`
23-
** Fleet: `All`
2417
* The user who gives the CSPM integration AWS permissions must be an AWS account `admin`.
2518
--
2619

docs/cloud-native-security/cspm-get-started-azure.asciidoc

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,10 @@ This page explains how to get started monitoring the security posture of your cl
1010
.Requirements
1111
[sidebar]
1212
--
13+
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1314
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1415
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1516
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
16-
* `Read` privileges for the following {es} indices:
17-
** `logs-cloud_security_posture.findings_latest-*`
18-
** `logs-cloud_security_posture.scores-*`
19-
* The following {kib} privileges:
20-
** Security: `Read`
21-
** Integrations: `Read`
22-
** Saved Objects Management: `Read`
23-
** Fleet: `All`
2417
* The user who gives the CSPM integration permissions in Azure must be an Azure subscription `admin`.
2518
--
2619

docs/cloud-native-security/cspm-get-started-gcp.asciidoc

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,10 @@ This page explains how to get started monitoring the security posture of your GC
1010
.Requirements
1111
[sidebar]
1212
--
13+
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1314
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1415
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1516
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
16-
* `Read` privileges for the following {es} indices:
17-
** `logs-cloud_security_posture.findings_latest-*`
18-
** `logs-cloud_security_posture.scores-*`
19-
* The following {kib} privileges:
20-
** Security: `Read`
21-
** Integrations: `Read`
22-
** Saved Objects Management: `Read`
23-
** Fleet: `All`
2417
* The user who gives the CSPM integration GCP permissions must be a GCP project `admin`.
2518
--
2619

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
[[cspm-required-permissions]]
2+
= CSPM privilege requirements
3+
4+
This page lists required privileges for {elastic-sec}'s CSPM features. There are three access levels: read, write, and manage. Each access level and its requirements are described below.
5+
6+
[discrete]
7+
== Read
8+
9+
Users with these minimum permissions can view data on the **Findings** page and the Cloud Posture dashboard.
10+
11+
[discrete]
12+
=== {es} index privileges
13+
`Read` privileges for the following {es} indices:
14+
15+
* `logs-cloud_security_posture.findings_latest-*`
16+
* `logs-cloud_security_posture.scores-*`
17+
18+
[discrete]
19+
=== {kib} privileges
20+
21+
* `Security: Read`
22+
23+
24+
[discrete]
25+
== Write
26+
27+
Users with these minimum permissions can view data on the **Findings** page and the Cloud Posture dashboard, create detection rules from the findings details flyout, and enable or disable benchmark rules.
28+
29+
[discrete]
30+
=== {es} index privileges
31+
`Read` privileges for the following {es} indices:
32+
33+
* `logs-cloud_security_posture.findings_latest-*`
34+
* `logs-cloud_security_posture.scores-*`
35+
36+
[discrete]
37+
=== {kib} privileges
38+
39+
* `Security: All`
40+
41+
42+
[discrete]
43+
== Manage
44+
45+
Users with these minimum permissions can view data on the **Findings** page and the Cloud Posture dashboard, create detection rules from the findings details flyout, enable or disable benchmark rules, and install, update, or uninstall CSPM integrations and assets.
46+
47+
[discrete]
48+
=== {es} index privileges
49+
`Read` privileges for the following {es} indices:
50+
51+
* `logs-cloud_security_posture.findings_latest-*`
52+
* `logs-cloud_security_posture.scores-*`
53+
54+
[discrete]
55+
=== {kib} privileges
56+
57+
* `Security: All`
58+
* `Spaces: All`
59+
* `Fleet: All`
60+
* `Integrations: All`
61+

0 commit comments

Comments
 (0)