From cd7da43ab01a5c313b2104fef3da68e0ceebaa7d Mon Sep 17 00:00:00 2001 From: Benjamin Ironside Goldstein <91905639+benironside@users.noreply.github.com> Date: Mon, 6 May 2024 21:07:02 -0400 Subject: [PATCH] Adds kibana namespace requirement to CNVM and CSPM (#5154) * Updates requirements section for CNVM and CSPM * minor updates - adds attribute (cherry picked from commit 5df1b3a2863e3b27884fa77b42b108bd9ea866da) --- docs/cloud-native-security/cspm-get-started-aws.asciidoc | 3 ++- docs/cloud-native-security/cspm-get-started-azure.asciidoc | 1 + docs/cloud-native-security/cspm-get-started-gcp.asciidoc | 1 + docs/cloud-native-security/cspm.asciidoc | 1 + .../cloud-native-security/vuln-management-get-started.asciidoc | 1 + docs/cloud-native-security/vuln-management-overview.asciidoc | 1 + 6 files changed, 7 insertions(+), 1 deletion(-) diff --git a/docs/cloud-native-security/cspm-get-started-aws.asciidoc b/docs/cloud-native-security/cspm-get-started-aws.asciidoc index 32032e4268..4870f9ae62 100644 --- a/docs/cloud-native-security/cspm-get-started-aws.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-aws.asciidoc @@ -11,6 +11,7 @@ This page explains how to get started monitoring the security posture of your cl [sidebar] -- * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. +* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). * To view posture data, you need `read` privileges for the following {es} indices: ** `logs-cloud_security_posture.findings_latest-*` @@ -203,7 +204,7 @@ image::images/cspm-aws-auth-3.png[The EC2 page in AWS, showing the Modify IAM ro .. Click *Update IAM role*. .. Return to {kib} and <>. -IMPORTANT: Make sure to deploy the CSPM integration to this EC2 instance. When completing setup in Kibana, in the *Setup Access* section, select *Assume role* and leave *Role ARN* empty. Click *Save and continue*. +IMPORTANT: Make sure to deploy the CSPM integration to this EC2 instance. When completing setup in {kib}, in the *Setup Access* section, select *Assume role* and leave *Role ARN* empty. Click *Save and continue*. [discrete] [[cspm-use-keys-directly]] diff --git a/docs/cloud-native-security/cspm-get-started-azure.asciidoc b/docs/cloud-native-security/cspm-get-started-azure.asciidoc index 73014a4b8e..732e2ae8cd 100644 --- a/docs/cloud-native-security/cspm-get-started-azure.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-azure.asciidoc @@ -11,6 +11,7 @@ This page explains how to get started monitoring the security posture of your cl [sidebar] -- * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. +* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). * To view posture data, you need `read` privileges for the following {es} indices: ** `logs-cloud_security_posture.findings_latest-*` diff --git a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc index 099c0b891d..3745844ae5 100644 --- a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc @@ -11,6 +11,7 @@ This page explains how to get started monitoring the security posture of your GC [sidebar] -- * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. +* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). * To view posture data, you need `read` privileges for the following {es} indices: ** `logs-cloud_security_posture.findings_latest-*` diff --git a/docs/cloud-native-security/cspm.asciidoc b/docs/cloud-native-security/cspm.asciidoc index 1a48a609de..ff6c0989c7 100644 --- a/docs/cloud-native-security/cspm.asciidoc +++ b/docs/cloud-native-security/cspm.asciidoc @@ -10,6 +10,7 @@ This feature currently supports Amazon Web Services (AWS), Google Cloud Platform -- * CSPM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. * {stack} version 8.10 or greater. +* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). -- diff --git a/docs/cloud-native-security/vuln-management-get-started.asciidoc b/docs/cloud-native-security/vuln-management-get-started.asciidoc index b65b378158..6736d9a4bc 100644 --- a/docs/cloud-native-security/vuln-management-get-started.asciidoc +++ b/docs/cloud-native-security/vuln-management-get-started.asciidoc @@ -8,6 +8,7 @@ This page explains how to set up Cloud Native Vulnerability Management (CNVM). -- * CNVM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. * Requires {stack} and {agent} version 8.8 or higher. +* CNVM only works in the `Default` {kib} space. Installing the CNVM integration on a different {kib} space will not work. * To view vulnerability scan findings, you need at least `read` privileges for the following indices: ** `logs-cloud_security_posture.vulnerabilities-*` ** `logs-cloud_security_posture.vulnerabilities_latest-*` diff --git a/docs/cloud-native-security/vuln-management-overview.asciidoc b/docs/cloud-native-security/vuln-management-overview.asciidoc index 894f045b9a..974eb21530 100644 --- a/docs/cloud-native-security/vuln-management-overview.asciidoc +++ b/docs/cloud-native-security/vuln-management-overview.asciidoc @@ -12,6 +12,7 @@ NOTE: CNVM currently only supports AWS EC2 Linux workloads. -- * CNVM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. * Requires {stack} and {agent} version 8.8 or higher. +* CNVM only works in the `Default` {kib} space. Installing the CNVM integration on a different {kib} space will not work. * To view vulnerability scan findings, you need at least `read` privileges for the following indices: ** `logs-cloud_security_posture.vulnerabilities-*` ** `logs-cloud_security_posture.vulnerabilities_latest-*`