-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[discuss] Adding a new Core encryption
service
#180867
Comments
Pinging @elastic/kibana-security (Team:Security) |
Pinging @elastic/kibana-core (Team:Core) |
cc @azasypkin @legrego and more globally @elastic/kibana-security, curious to have your thought on this, given you're probably all have a better vision than we do on what should a global/core encryption service look like. |
Just from our previous discussions, in terms of what the service could help us with:
What did I forget? |
@pgayvallet your list looks good to me. To make
One other use case I thought of is user preferences. I fully expect that solution teams will eventually need a way to securely store user-specific settings. Having a core encryption service would facilitate this as well. |
The list seems to cover the majority of the benefits I can think of at the moment, thanks! The only two things that might be worth mentioning explicitly, even though it's implied, are that 1) we'll hopefully have a single approach to rotate the encryption keys (declaratively via config and programmatically via APIs) and 2) detect encryption misconfigurations more easily.
++, I've already heard about the use cases that could benefit from this (e.g., user-level integrations with external systems like ChatGPT or CoPilot that might require us to store user-specific external credentials). |
Next steps from our latest Core/Security sync: We agreed that @elastic/kibana-security would produce an initial RFC, with Core contributing support for the API design. |
@legrego do you know already would be on charge of the RFC in the Security team? I'd gladly be the main contact point on Core's side. |
@pgayvallet no, we haven't planned this work yet. Thanks for offering to be our point of contact, we'll be sure to coordinate with you |
Discussion started in #178304:
I'm opening this issue to discuss about what this new
encryption
service could look like, in term of features, responsibilities and APIs.The text was updated successfully, but these errors were encountered: