Skip to content

Commit

Permalink
8.10 bugfixes (#4007)
Browse files Browse the repository at this point in the history
* fixes several 8.10 bugs

* removes beta tag from two images

* Fixes some missed instances of "Cloud Posture"

(cherry picked from commit b13e84b)
  • Loading branch information
benironside authored and mergify[bot] committed Oct 10, 2023
1 parent 4153d01 commit 31a7739
Show file tree
Hide file tree
Showing 16 changed files with 34 additions and 34 deletions.
2 changes: 1 addition & 1 deletion docs/cloud-native-security/cspm-benchmark-rules.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Each benchmark rule checks to see if a specific type of resource is configured a
* `Ensure the default namespace is not in use`


When benchmark rules are evaluated, the resulting <<findings-page, findings>> data appears on the <<cloud-posture-dashboard, Cloud Posture dashboard>>.
When benchmark rules are evaluated, the resulting <<findings-page, findings>> data appears on the <<cloud-posture-dashboard, Cloud Security Posture dashboard>>.

To find the Benchmark Integrations page, go to **Rules -> Benchmark rules**. From there, you can view the benchmark rules associated with an existing integration by clicking the integration name.

Expand Down
12 changes: 6 additions & 6 deletions docs/cloud-native-security/cspm-cloud-posture-dashboard.asciidoc
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
[[cspm-posture-dashboard]]
// Note: This page is intentionally duplicated by docs/dashboards/cloud-posture.asciidoc. When you update this page, update that page to match. And careful with the anchor links because they should not match.

= Cloud Posture dashboard
= Cloud Security Posture dashboard

The Cloud Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To get started monitoring your security posture, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.
The Cloud Security Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To get started monitoring your security posture, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.

[role="screenshot"]
image::images/cloud-sec-dash-aws-version.png[The cloud Security dashboard]

The Cloud Posture dashboard shows:
The Cloud Security Posture dashboard shows:

* Configuration risk metrics for all monitored cloud accounts and Kubernetes clusters
* Configuration risk metrics for individual cloud accounts and Kubernetes clusters
Expand All @@ -17,12 +17,12 @@ The Cloud Posture dashboard shows:
.Requirements
[sidebar]
--
* The Cloud Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
* The Cloud Security Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
--

[discrete]
[[cspm-posture-dashboard-UI]]
== Cloud Posture dashboard UI
== Cloud Security Posture dashboard UI

At the top of the dashboard, you can switch between the Cloud accounts and Kubernetes cluster views.

Expand All @@ -33,7 +33,7 @@ The remaining summary cards show your overall posture score, and total failed fi
Below the summary section, each row shows the CSP of a single Cloud account or Kubernetes cluster, including its name, when its posture was last evaluated, its compliance score, and failed findings grouped by CIS section. When you begin to monitor a new account or cluster, a new row appears.

[role="screenshot"]
image::images/cloud-sec-dash-aws-version-row.png[A row representing a single cluster in the Cloud Posture dashboard]
image::images/cloud-sec-dash-aws-version-row.png[A row representing a single cluster in the Cloud Security Posture dashboard]

[discrete]
[[cspm-posture-dashboard-faq]]
Expand Down
4 changes: 2 additions & 2 deletions docs/cloud-native-security/cspm-faq.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -23,11 +23,11 @@ This capability is not currently supported but will be added in future iteration

*When do newly enrolled cloud accounts appear on the dashboard?*

After you deploy the CSPM integration, it can take up to 10 minutes for resource fetching, evaluation, and data processing before a newly enrolled account appears on the Cloud Posture dashboard.
After you deploy the CSPM integration, it can take up to 10 minutes for resource fetching, evaluation, and data processing before a newly enrolled account appears on the Cloud Security Posture dashboard.

*When do unenrolled cloud accounts disappear from the dashboard?*

Newly unenrolled cloud accounts can take a maximum of 24 hours to disappear from the Cloud Posture dashboard.
Newly unenrolled cloud accounts can take a maximum of 24 hours to disappear from the Cloud Security Posture dashboard.


[discrete]
Expand Down
2 changes: 1 addition & 1 deletion docs/cloud-native-security/cspm.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,4 @@ This feature currently supports Amazon Web Services (AWS) and Google Cloud Platf
== How CSPM works

Using the read-only credentials you will provide during the setup process, it will evaluate the configuration of resources in your environment every 4 hours.
After each evaluation, the integration sends findings to Elastic. A high-level summary of the findings appears on the <<cloud-nat-sec-posture-dashboard,Cloud posture dashboard>>, and detailed findings appear on the <<findings-page,Findings page>>.
After each evaluation, the integration sends findings to Elastic. A high-level summary of the findings appears on the <<cloud-nat-sec-posture-dashboard,Cloud Security Posture dashboard>>, and detailed findings appear on the <<findings-page,Findings page>>.
Binary file modified docs/cloud-native-security/images/cnvm-findings-grouped.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/cloud-native-security/images/cnvm-findings-page.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/cloud-native-security/images/findings-page.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/cloud-native-security/images/vuln-management-dashboard.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
2 changes: 1 addition & 1 deletion docs/cloud-native-security/kspm-benchmark-rules.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Each benchmark rule checks to see if a specific type of resource is configured a
* `Ensure the default namespace is not in use`


When benchmark rules are evaluated, the resulting <<findings-page, findings>> data appears on the <<cloud-posture-dashboard, Cloud Posture dashboard>>.
When benchmark rules are evaluated, the resulting <<findings-page, findings>> data appears on the <<cloud-posture-dashboard, Cloud Security Posture dashboard>>.

To find the Benchmark Integrations page, go to **Rules -> Benchmark rules**. From there, you can view the benchmark rules associated with an existing integration by clicking the integration name.

Expand Down
12 changes: 6 additions & 6 deletions docs/cloud-native-security/kspm-cloud-posture-dashboard.asciidoc
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
[[cloud-nat-sec-posture-dashboard]]
// Note: This page is intentionally duplicated by docs/dashboards/cloud-posture.asciidoc. When you update this page, update that page to match. And careful with the anchor links because they should not match.

= Cloud Posture dashboard
= Cloud Security Posture dashboard

The Cloud Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To start collecting this data, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.
The Cloud Security Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To start collecting this data, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.

[role="screenshot"]
image::images/cloud-sec-dashboard.png[The cloud Security dashboard]

The Cloud Posture dashboard shows:
The Cloud Security Posture dashboard shows:

* Configuration risk metrics for all monitored cloud accounts and Kubernetes clusters
* Configuration risk metrics for individual cloud accounts and Kubernetes clusters
Expand All @@ -17,12 +17,12 @@ The Cloud Posture dashboard shows:
.Requirements
[sidebar]
--
* The Cloud Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
* The Cloud Security Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
--

[discrete]
[[cloud-nat-sec-posture-dashboard-UI]]
== Cloud Posture dashboard UI
== Cloud Security Posture dashboard UI

At the top of the dashboard, you can switch between the Cloud accounts and Kubernetes cluster views.

Expand All @@ -33,7 +33,7 @@ The remaining summary cards show your overall posture score, and total failed fi
Below the summary section, each row shows the CSP of a single Cloud account or Kubernetes cluster, including its name, when its posture was last evaluated, its compliance score, and failed findings grouped by CIS section. When you begin to monitor a new account or cluster, a new row appears.

[role="screenshot"]
image::images/cloud-sec-dashboard-individual-row.png[A row representing a single cluster in the Cloud Posture dashboard]
image::images/cloud-sec-dashboard-individual-row.png[A row representing a single cluster in the Cloud Security Posture dashboard]

[discrete]
[[cloud-nat-sec-posture-dashboard-faq]]
Expand Down
4 changes: 2 additions & 2 deletions docs/cloud-native-security/kspm-faq.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -24,11 +24,11 @@ This capability is not currently supported but will be added in future iteration

*When do newly enrolled cloud accounts appear on the dashboard?*

After you deploy the CSPM integration, it can take up to 10 minutes for resource fetching, evaluation, and data processing before a newly enrolled account appears on the Cloud Posture dashboard.
After you deploy the CSPM integration, it can take up to 10 minutes for resource fetching, evaluation, and data processing before a newly enrolled account appears on the Cloud Security Posture dashboard.

*When do unenrolled cloud accounts disappear from the dashboard?*

Newly unenrolled cloud accounts can take a maximum of 24 hours to disappear from the Cloud Posture dashboard.
Newly unenrolled cloud accounts can take a maximum of 24 hours to disappear from the Cloud Security Posture dashboard.


[[kspm-faq]]
Expand Down
8 changes: 4 additions & 4 deletions docs/cloud-native-security/kspm-get-started.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ The instructions differ depending on whether you're installing on EKS or on unma
[discrete]
=== Name your integration and select a Kubernetes Deployment type

1. Go to *Dashboards -> Cloud Posture*.
1. Go to *Dashboards -> Cloud Security Posture*.
2. Click *Add a KSPM integration*.
3. Read the integration's description to understand how it works. Then, click {integrations-docs}/cloud_security_posture[*Add Kubernetes Security Posture Management*].
4. Name your integration. Use a name that matches the purpose or team of the cluster(s) you want to monitor, for example, `IT-dev-k8s-clusters`.
Expand Down Expand Up @@ -220,7 +220,7 @@ The *Add agent* wizard helps you deploy the KSPM integration on the Kubernetes c
1. Download the manifest and make any necessary revisions to its configuration to suit the needs of your environment.
2. Apply the manifest using the `kubectl apply -f` command. For example: `kubectl apply -f elastic-agent-managed-kubernetes.yaml`

After a few minutes, a message confirming the {agent} enrollment appears, followed by a message confirming that data is incoming. You can then click *View assets* to see where the newly-collected configuration information appears throughout {kib}, including the <<findings-page,Findings page>> and the <<cloud-posture-dashboard, Cloud Posture dashboard>>.
After a few minutes, a message confirming the {agent} enrollment appears, followed by a message confirming that data is incoming. You can then click *View assets* to see where the newly-collected configuration information appears throughout {kib}, including the <<findings-page,Findings page>> and the <<cloud-posture-dashboard, Cloud Security Posture dashboard>>.


[discrete]
Expand All @@ -233,7 +233,7 @@ Follow these steps to deploy the KSPM integration to unmanaged clusters. Keep in
=== Configure the KSPM integration
To install the integration on unmanaged clusters:

. Go to *Dashboards -> Cloud Posture*.
. Go to *Dashboards -> Cloud Security Posture*.
. Click *Add a KSPM integration*.
. Read the integration's description to understand how it works. Then, click {integrations-docs}/cloud_security_posture[*Add Kubernetes Security Posture Management*].
. Name your integration. Use a name that matches the purpose or team of the cluster(s) you want to monitor, for example, `IT-dev-k8s-clusters`.
Expand All @@ -254,7 +254,7 @@ The *Add agent* wizard helps you deploy the KSPM integration on the Kubernetes c
1. Download the manifest and make any necessary revisions to its configuration to suit the needs of your environment.
2. Apply the manifest using the `kubectl apply -f` command. For example: `kubectl apply -f elastic-agent-managed-kubernetes.yaml`

After a few minutes, a message confirming the {agent} enrollment appears, followed by a message confirming that data is incoming. You can then click *View assets* to see where the newly-collected configuration information appears throughout {kib}, including the <<findings-page,Findings page>> and the <<cloud-posture-dashboard, Cloud Posture dashboard>>.
After a few minutes, a message confirming the {agent} enrollment appears, followed by a message confirming that data is incoming. You can then click *View assets* to see where the newly-collected configuration information appears throughout {kib}, including the <<findings-page,Findings page>> and the <<cloud-posture-dashboard, Cloud Security Posture dashboard>>.

[discrete]
[[kspm-eck]]
Expand Down
6 changes: 3 additions & 3 deletions docs/cloud-native-security/kspm.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ This integration supports Amazon EKS and unmanaged Kubernetes clusters. For setu
== How KSPM works
. When you add a KSPM integration, it generates a Kubernetes manifest. When applied to a cluster, the manifest deploys an {agent} as a https://kubernetes.io/docs/concepts/workloads/controllers/daemonset[DaemonSet] to ensure all nodes are evaluated.
. Upon deployment, the integration immediately assesses the security posture of your Kubernetes resources. The evaluation process repeats every four hours.
. After each evaluation, the integration sends findings to {es}. Findings appear on the <<cloud-nat-sec-posture-dashboard,Cloud posture dashboard>> and the <<findings-page,findings>> page.
. After each evaluation, the integration sends findings to {es}. Findings appear on the <<cloud-nat-sec-posture-dashboard,Cloud Security Posture dashboard>> and the <<findings-page,findings>> page.

[discrete]
[[kspm-use-cases]]
Expand All @@ -38,7 +38,7 @@ The KSPM integration helps you to:

To identify and remediate failed failed findings:

. Go to the <<cloud-nat-sec-posture-dashboard,Cloud posture dashboard>>.
. Go to the <<cloud-nat-sec-posture-dashboard,Cloud Security Posture dashboard>>.
. Click *View all failed findings*, either for an individual cluster or for all monitored clusters.
. Click a failed finding. The findings flyout opens.
. Follow the steps under *Remediation* to correct the misconfiguration.
Expand All @@ -61,7 +61,7 @@ To identify the Kubernetes resources generating the most failed findings:

To identify risks in particular CIS sections:

. Go to the <<cloud-nat-sec-posture-dashboard,Cloud posture dashboard>> (*Dashboards -> Cloud Posture*).
. Go to the <<cloud-nat-sec-posture-dashboard,Cloud Security Posture dashboard>> (*Dashboards -> Cloud Security Posture*).
. In the Failed findings by CIS section widget, click the name of a CIS section to view all failed findings for that section.

Alternatively:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,14 +23,14 @@ Using the data generated by these features, you can:

*Identify and secure misconfigured infrastructure:*

. Go to the Cloud Posture dashboard (*Dashboards > Cloud Posture*).
. Go to the Cloud Security Posture dashboard (*Dashboards > Cloud Security Posture*).
. Click *View all failed findings*, either for an individual resource or a group of resources.
. Click a failed finding to open the Findings flyout.
. Follow the steps under Remediation to fix the misconfiguration.

*Identify the CIS Sections (security best practice categories) with which your resources are least compliant:*

. Go to the Cloud Posture dashboard (*Dashboards > Cloud Posture*).
. Go to the Cloud Security Posture dashboard (*Dashboards > Cloud Security Posture*).
. Do one of the following:
.. Under Failed findings by CIS section, click the name of a CIS section to view all failed findings from that section.
.. Go to the *Findings* page and filter by the `rule.section` field. For example, search for `rule.section : API Server` to view findings from the API Server category.
Expand Down
12 changes: 6 additions & 6 deletions docs/dashboards/cloud-posture.asciidoc
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
[[cloud-posture-dashboard]]
// Note: This page is intentionally duplicated by docs/cloud-native-security/cloud-nat-sec-posture.asciidoc. When you update this page, update that page to match. And careful with the anchor links because they should not match.

= Cloud Posture dashboard
The Cloud Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To start collecting this data, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.
= Cloud Security Posture dashboard
The Cloud Security Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To start collecting this data, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.

[role="screenshot"]
image::images/cloud-sec-dashboard.png[The cloud Security dashboard]

The Cloud Posture dashboard shows:
The Cloud Security Posture dashboard shows:

* Configuration risk metrics for all monitored cloud accounts and Kubernetes clusters
* Configuration risk metrics for individual cloud accounts and Kubernetes clusters
Expand All @@ -16,12 +16,12 @@ The Cloud Posture dashboard shows:
.Requirements
[sidebar]
--
* The Cloud Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
* The Cloud Security Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
--

[discrete]
[[cloud-posture-dashboard-UI]]
=== Cloud Posture dashboard UI
=== Cloud Security Posture dashboard UI

At the top of the dashboard, you can switch between the Cloud accounts and Kubernetes cluster views.

Expand All @@ -32,7 +32,7 @@ The remaining summary cards show your overall posture score, and total failed fi
Below the summary section, each row shows the CSP of a single Cloud account or Kubernetes cluster, including its name, when its posture was last evaluated, its compliance score, and failed findings grouped by CIS section. When you begin to monitor a new account or cluster, a new row appears.

[role="screenshot"]
image::images/cloud-sec-dashboard-individual-row.png[A row representing a single cluster in the Cloud Posture dashboard]
image::images/cloud-sec-dashboard-individual-row.png[A row representing a single cluster in the Cloud Security Posture dashboard]

[discrete]
[[cloud-posture-dashboard-faq]]
Expand Down
Binary file modified docs/dashboards/images/kubernetes-dashboard.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 31a7739

Please sign in to comment.