Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request for Elastic Kibana: Enhanced Security for Fleet Integrations through One-Way Secret Addition #171854

Closed
slawomirbabicz opened this issue Nov 23, 2023 · 2 comments
Labels
Team:Fleet Team label for Observability Data Collection Fleet team

Comments

@slawomirbabicz
Copy link

Describe the feature:

Current Situation:
Fleet Integrations in Elastic Kibana are an essential component, widely used for configuring various services. During configuration, these integrations often require input of sensitive information, such as usernames, integration keys, API keys, secret keys, and URL endpoints. This sensitive data is crucial for the operational integrity and security of the services being integrated.

Issue Identified:
Currently, any user with elevated permissions within Kibana's GUI has the ability to access the Fleet configuration and view these sensitive details. This accessibility poses a significant security risk, as it allows individuals with access to easily retrieve and potentially misuse these sensitive credentials, leading to unauthorized use of services, data breaches, or other security incidents.

Proposed Feature:
To address this security vulnerability, I propose the introduction of a "one-way secret addition" feature for Fleet Integrations within Kibana. This feature would be akin to the mechanism used in GitHub Actions for handling secrets, where the sensitive data can be added or updated but not viewed or edited post-submission.

Describe a specific use case for the feature:

Benefits:

- Enhanced Security: By preventing the visibility of sensitive data post-entry, the risk of unauthorized access and misuse of credentials is significantly reduced.
- Audit and Control: This feature would also aid in better audit and control mechanisms, as any changes or additions to sensitive data would require deliberate actions, thereby reducing inadvertent exposure.
- Alignment with Best Practices: Implementing such a feature aligns Kibana with industry best practices for handling sensitive information, thus bolstering user trust and compliance with various data protection standards.
Impact on Users:
This enhancement will benefit all users who manage and configure Fleet Integrations, especially in environments where multiple users have access to Kibana's configuration settings. It will ensure that sensitive data is handled more securely, ultimately protecting the integrity of the systems and data that Kibana helps manage.

Conclusion:
I firmly believe that introducing a one-way secret addition feature for Fleet Integrations in Kibana would be a significant step forward in ensuring the security and integrity of sensitive data. I look forward to seeing this enhancement in future releases and am available for any further discussion or clarification needed on this proposal.

Thank you for considering this request.

@botelastic botelastic bot added the needs-team Issues missing a team label label Nov 23, 2023
@criamico criamico added the Team:Fleet Team label for Observability Data Collection Fleet team label Nov 30, 2023
@elasticmachine
Copy link
Contributor

Pinging @elastic/fleet (Team:Fleet)

@botelastic botelastic bot removed the needs-team Issues missing a team label label Nov 30, 2023
@kpollich
Copy link
Member

Good new here: secrets support exactly as described landed in Kibana 8.10: #154715.

We're now actively driving adoption of secrets across as many integrations as possible in elastic/integrations#8610

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Team:Fleet Team label for Observability Data Collection Fleet team
Projects
None yet
Development

No branches or pull requests

4 participants