Skip to content

Commit

Permalink
[8.16] Creates CSPM privileges standalone page (backport #6269) (#6319)
Browse files Browse the repository at this point in the history
* Creates CSPM privileges standalone page (#6269)

* Creates CSPM privileges standalone page

* ports updates to serverless

* Apply suggestions from code review

Co-authored-by: natasha-moore-elastic <[email protected]>

* Apply suggestions from code review

Co-authored-by: Nastasha Solomon <[email protected]>

---------

Co-authored-by: natasha-moore-elastic <[email protected]>
Co-authored-by: Nastasha Solomon <[email protected]>
(cherry picked from commit 51b58c2)

# Conflicts:
#	docs/serverless/cloud-native-security/cspm-get-started-azure.asciidoc
#	docs/serverless/cloud-native-security/cspm-get-started-gcp.asciidoc
#	docs/serverless/cloud-native-security/cspm-get-started.asciidoc
#	docs/serverless/index.asciidoc

* Delete docs/serverless directory and its contents

---------

Co-authored-by: Benjamin Ironside Goldstein <[email protected]>
Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
  • Loading branch information
3 people authored Dec 13, 2024
1 parent b49fd3b commit 1d89e62
Show file tree
Hide file tree
Showing 5 changed files with 65 additions and 24 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,7 @@ include::cspm.asciidoc[leveloffset=+1]
include::cspm-get-started-aws.asciidoc[leveloffset=+2]
include::cspm-get-started-gcp.asciidoc[leveloffset=+2]
include::cspm-get-started-azure.asciidoc[leveloffset=+2]
include::cspm-permissions.asciidoc[leveloffset=+2]
include::cspm-findings.asciidoc[leveloffset=+2]
include::cspm-benchmark-rules.asciidoc[leveloffset=+2]
include::cspm-cloud-posture-dashboard.asciidoc[leveloffset=+2]
Expand Down
9 changes: 1 addition & 8 deletions docs/cloud-native-security/cspm-get-started-aws.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -10,17 +10,10 @@ This page explains how to get started monitoring the security posture of your cl
.Requirements
[sidebar]
--
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
* `Read` privileges for the following {es} indices:
** `logs-cloud_security_posture.findings_latest-*`
** `logs-cloud_security_posture.scores-*`
* The following {kib} privileges:
** Security: `Read`
** Integrations: `Read`
** Saved Objects Management: `Read`
** Fleet: `All`
* The user who gives the CSPM integration AWS permissions must be an AWS account `admin`.
--

Expand Down
9 changes: 1 addition & 8 deletions docs/cloud-native-security/cspm-get-started-azure.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -10,17 +10,10 @@ This page explains how to get started monitoring the security posture of your cl
.Requirements
[sidebar]
--
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
* `Read` privileges for the following {es} indices:
** `logs-cloud_security_posture.findings_latest-*`
** `logs-cloud_security_posture.scores-*`
* The following {kib} privileges:
** Security: `Read`
** Integrations: `Read`
** Saved Objects Management: `Read`
** Fleet: `All`
* The user who gives the CSPM integration permissions in Azure must be an Azure subscription `admin`.
--

Expand Down
9 changes: 1 addition & 8 deletions docs/cloud-native-security/cspm-get-started-gcp.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -10,17 +10,10 @@ This page explains how to get started monitoring the security posture of your GC
.Requirements
[sidebar]
--
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
* `Read` privileges for the following {es} indices:
** `logs-cloud_security_posture.findings_latest-*`
** `logs-cloud_security_posture.scores-*`
* The following {kib} privileges:
** Security: `Read`
** Integrations: `Read`
** Saved Objects Management: `Read`
** Fleet: `All`
* The user who gives the CSPM integration GCP permissions must be a GCP project `admin`.
--

Expand Down
61 changes: 61 additions & 0 deletions docs/cloud-native-security/cspm-permissions.asciidoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,61 @@
[[cspm-required-permissions]]
= CSPM privilege requirements

This page lists required privileges for {elastic-sec}'s CSPM features. There are three access levels: read, write, and manage. Each access level and its requirements are described below.

[discrete]
== Read

Users with these minimum permissions can view data on the **Findings** page and the Cloud Posture dashboard.

[discrete]
=== {es} index privileges
`Read` privileges for the following {es} indices:

* `logs-cloud_security_posture.findings_latest-*`
* `logs-cloud_security_posture.scores-*`

[discrete]
=== {kib} privileges

* `Security: Read`


[discrete]
== Write

Users with these minimum permissions can view data on the **Findings** page and the Cloud Posture dashboard, create detection rules from the findings details flyout, and enable or disable benchmark rules.

[discrete]
=== {es} index privileges
`Read` privileges for the following {es} indices:

* `logs-cloud_security_posture.findings_latest-*`
* `logs-cloud_security_posture.scores-*`

[discrete]
=== {kib} privileges

* `Security: All`


[discrete]
== Manage

Users with these minimum permissions can view data on the **Findings** page and the Cloud Posture dashboard, create detection rules from the findings details flyout, enable or disable benchmark rules, and install, update, or uninstall CSPM integrations and assets.

[discrete]
=== {es} index privileges
`Read` privileges for the following {es} indices:

* `logs-cloud_security_posture.findings_latest-*`
* `logs-cloud_security_posture.scores-*`

[discrete]
=== {kib} privileges

* `Security: All`
* `Spaces: All`
* `Fleet: All`
* `Integrations: All`

0 comments on commit 1d89e62

Please sign in to comment.