Skip to content

Commit

Permalink
Update CSPM docs (#4836)
Browse files Browse the repository at this point in the history
* Update cspm doc

Update scam time to 24h

* minor addition

---------

Co-authored-by: Benjamin Ironside Goldstein <[email protected]>
Co-authored-by: Benjamin Ironside Goldstein <[email protected]>
  • Loading branch information
3 people authored Mar 8, 2024
1 parent daf5aba commit d08cf6b
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion docs/cloud-native-security/cspm-faq.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ You can access findings data using the following index patterns:
Resources are fetched and evaluated against benchmark rules when a security posture management integration is deployed. After that, the CSPM integration evaluates every 24 hours, and the KSPM integration evaluates every four hours.

*Can I configure an integration's fetch cycle?*
No, the four-hour fetch cycle is not configurable.
No, the fetch cycle's timing is not configurable.

*Can I contribute to the CSP ruleset?*
You can't directly edit benchmark rules. The rules are defined https://github.com/elastic/csp-security-policies[in this repository], where you can raise issues with certain rules. They are written in https://www.openpolicyagent.org/docs/latest/policy-language/[Rego].
Expand Down
2 changes: 1 addition & 1 deletion docs/cloud-native-security/cspm.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -17,5 +17,5 @@ This feature currently supports Amazon Web Services (AWS), Google Cloud Platform
[[cspm-how-it-works]]
== How CSPM works

Using the read-only credentials you will provide during the setup process, it will evaluate the configuration of resources in your environment every 4 hours.
Using the read-only credentials you will provide during the setup process, it will evaluate the configuration of resources in your environment every 24 hours.
After each evaluation, the integration sends findings to Elastic. A high-level summary of the findings appears on the <<cloud-nat-sec-posture-dashboard,Cloud Security Posture dashboard>>, and detailed findings appear on the <<findings-page,Findings page>>.

0 comments on commit d08cf6b

Please sign in to comment.