Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

8.10 bugfixes #4007

Merged
merged 4 commits into from
Oct 10, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/cloud-native-security/cspm-benchmark-rules.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Each benchmark rule checks to see if a specific type of resource is configured a
* `Ensure the default namespace is not in use`


When benchmark rules are evaluated, the resulting <<findings-page, findings>> data appears on the <<cloud-posture-dashboard, Cloud Posture dashboard>>.
When benchmark rules are evaluated, the resulting <<findings-page, findings>> data appears on the <<cloud-posture-dashboard, Cloud Security Posture dashboard>>.

To find the Benchmark Integrations page, go to **Rules -> Benchmark rules**. From there, you can view the benchmark rules associated with an existing integration by clicking the integration name.

Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
[[cspm-posture-dashboard]]
// Note: This page is intentionally duplicated by docs/dashboards/cloud-posture.asciidoc. When you update this page, update that page to match. And careful with the anchor links because they should not match.

= Cloud Posture dashboard
= Cloud Security Posture dashboard

The Cloud Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To get started monitoring your security posture, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.
The Cloud Security Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To get started monitoring your security posture, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.

[role="screenshot"]
image::images/cloud-sec-dash-aws-version.png[The cloud Security dashboard]

The Cloud Posture dashboard shows:
The Cloud Security Posture dashboard shows:

* Configuration risk metrics for all monitored cloud accounts and Kubernetes clusters
* Configuration risk metrics for individual cloud accounts and Kubernetes clusters
Expand All @@ -17,12 +17,12 @@ The Cloud Posture dashboard shows:
.Requirements
[sidebar]
--
* The Cloud Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
* The Cloud Security Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
--

[discrete]
[[cspm-posture-dashboard-UI]]
== Cloud Posture dashboard UI
== Cloud Security Posture dashboard UI

At the top of the dashboard, you can switch between the Cloud accounts and Kubernetes cluster views.

Expand All @@ -33,7 +33,7 @@ The remaining summary cards show your overall posture score, and total failed fi
Below the summary section, each row shows the CSP of a single Cloud account or Kubernetes cluster, including its name, when its posture was last evaluated, its compliance score, and failed findings grouped by CIS section. When you begin to monitor a new account or cluster, a new row appears.

[role="screenshot"]
image::images/cloud-sec-dash-aws-version-row.png[A row representing a single cluster in the Cloud Posture dashboard]
image::images/cloud-sec-dash-aws-version-row.png[A row representing a single cluster in the Cloud Security Posture dashboard]

[discrete]
[[cspm-posture-dashboard-faq]]
Expand Down
4 changes: 2 additions & 2 deletions docs/cloud-native-security/cspm-faq.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -23,11 +23,11 @@ This capability is not currently supported but will be added in future iteration

*When do newly enrolled cloud accounts appear on the dashboard?*

After you deploy the CSPM integration, it can take up to 10 minutes for resource fetching, evaluation, and data processing before a newly enrolled account appears on the Cloud Posture dashboard.
After you deploy the CSPM integration, it can take up to 10 minutes for resource fetching, evaluation, and data processing before a newly enrolled account appears on the Cloud Security Posture dashboard.

*When do unenrolled cloud accounts disappear from the dashboard?*

Newly unenrolled cloud accounts can take a maximum of 24 hours to disappear from the Cloud Posture dashboard.
Newly unenrolled cloud accounts can take a maximum of 24 hours to disappear from the Cloud Security Posture dashboard.


[discrete]
Expand Down
2 changes: 1 addition & 1 deletion docs/cloud-native-security/cspm.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,4 @@ This feature currently supports Amazon Web Services (AWS) and Google Cloud Platf
== How CSPM works

Using the read-only credentials you will provide during the setup process, it will evaluate the configuration of resources in your environment every 4 hours.
After each evaluation, the integration sends findings to Elastic. A high-level summary of the findings appears on the <<cloud-nat-sec-posture-dashboard,Cloud posture dashboard>>, and detailed findings appear on the <<findings-page,Findings page>>.
After each evaluation, the integration sends findings to Elastic. A high-level summary of the findings appears on the <<cloud-nat-sec-posture-dashboard,Cloud Security Posture dashboard>>, and detailed findings appear on the <<findings-page,Findings page>>.
Binary file modified docs/cloud-native-security/images/cnvm-findings-grouped.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/cloud-native-security/images/cnvm-findings-page.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/cloud-native-security/images/findings-page.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
2 changes: 1 addition & 1 deletion docs/cloud-native-security/kspm-benchmark-rules.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Each benchmark rule checks to see if a specific type of resource is configured a
* `Ensure the default namespace is not in use`


When benchmark rules are evaluated, the resulting <<findings-page, findings>> data appears on the <<cloud-posture-dashboard, Cloud Posture dashboard>>.
When benchmark rules are evaluated, the resulting <<findings-page, findings>> data appears on the <<cloud-posture-dashboard, Cloud Security Posture dashboard>>.

To find the Benchmark Integrations page, go to **Rules -> Benchmark rules**. From there, you can view the benchmark rules associated with an existing integration by clicking the integration name.

Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
[[cloud-nat-sec-posture-dashboard]]
// Note: This page is intentionally duplicated by docs/dashboards/cloud-posture.asciidoc. When you update this page, update that page to match. And careful with the anchor links because they should not match.

= Cloud Posture dashboard
= Cloud Security Posture dashboard

The Cloud Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To start collecting this data, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.
The Cloud Security Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To start collecting this data, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.

[role="screenshot"]
image::images/cloud-sec-dashboard.png[The cloud Security dashboard]

The Cloud Posture dashboard shows:
The Cloud Security Posture dashboard shows:

* Configuration risk metrics for all monitored cloud accounts and Kubernetes clusters
* Configuration risk metrics for individual cloud accounts and Kubernetes clusters
Expand All @@ -17,12 +17,12 @@ The Cloud Posture dashboard shows:
.Requirements
[sidebar]
--
* The Cloud Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
* The Cloud Security Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
--

[discrete]
[[cloud-nat-sec-posture-dashboard-UI]]
== Cloud Posture dashboard UI
== Cloud Security Posture dashboard UI

At the top of the dashboard, you can switch between the Cloud accounts and Kubernetes cluster views.

Expand All @@ -33,7 +33,7 @@ The remaining summary cards show your overall posture score, and total failed fi
Below the summary section, each row shows the CSP of a single Cloud account or Kubernetes cluster, including its name, when its posture was last evaluated, its compliance score, and failed findings grouped by CIS section. When you begin to monitor a new account or cluster, a new row appears.

[role="screenshot"]
image::images/cloud-sec-dashboard-individual-row.png[A row representing a single cluster in the Cloud Posture dashboard]
image::images/cloud-sec-dashboard-individual-row.png[A row representing a single cluster in the Cloud Security Posture dashboard]

[discrete]
[[cloud-nat-sec-posture-dashboard-faq]]
Expand Down
4 changes: 2 additions & 2 deletions docs/cloud-native-security/kspm-faq.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -24,11 +24,11 @@ This capability is not currently supported but will be added in future iteration

*When do newly enrolled cloud accounts appear on the dashboard?*

After you deploy the CSPM integration, it can take up to 10 minutes for resource fetching, evaluation, and data processing before a newly enrolled account appears on the Cloud Posture dashboard.
After you deploy the CSPM integration, it can take up to 10 minutes for resource fetching, evaluation, and data processing before a newly enrolled account appears on the Cloud Security Posture dashboard.

*When do unenrolled cloud accounts disappear from the dashboard?*

Newly unenrolled cloud accounts can take a maximum of 24 hours to disappear from the Cloud Posture dashboard.
Newly unenrolled cloud accounts can take a maximum of 24 hours to disappear from the Cloud Security Posture dashboard.


[[kspm-faq]]
Expand Down
8 changes: 4 additions & 4 deletions docs/cloud-native-security/kspm-get-started.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ The instructions differ depending on whether you're installing on EKS or on unma
[discrete]
=== Name your integration and select a Kubernetes Deployment type

1. Go to *Dashboards -> Cloud Posture*.
1. Go to *Dashboards -> Cloud Security Posture*.
2. Click *Add a KSPM integration*.
3. Read the integration's description to understand how it works. Then, click {integrations-docs}/cloud_security_posture[*Add Kubernetes Security Posture Management*].
4. Name your integration. Use a name that matches the purpose or team of the cluster(s) you want to monitor, for example, `IT-dev-k8s-clusters`.
Expand Down Expand Up @@ -220,7 +220,7 @@ The *Add agent* wizard helps you deploy the KSPM integration on the Kubernetes c
1. Download the manifest and make any necessary revisions to its configuration to suit the needs of your environment.
2. Apply the manifest using the `kubectl apply -f` command. For example: `kubectl apply -f elastic-agent-managed-kubernetes.yaml`

After a few minutes, a message confirming the {agent} enrollment appears, followed by a message confirming that data is incoming. You can then click *View assets* to see where the newly-collected configuration information appears throughout {kib}, including the <<findings-page,Findings page>> and the <<cloud-posture-dashboard, Cloud Posture dashboard>>.
After a few minutes, a message confirming the {agent} enrollment appears, followed by a message confirming that data is incoming. You can then click *View assets* to see where the newly-collected configuration information appears throughout {kib}, including the <<findings-page,Findings page>> and the <<cloud-posture-dashboard, Cloud Security Posture dashboard>>.


[discrete]
Expand All @@ -233,7 +233,7 @@ Follow these steps to deploy the KSPM integration to unmanaged clusters. Keep in
=== Configure the KSPM integration
To install the integration on unmanaged clusters:

. Go to *Dashboards -> Cloud Posture*.
. Go to *Dashboards -> Cloud Security Posture*.
. Click *Add a KSPM integration*.
. Read the integration's description to understand how it works. Then, click {integrations-docs}/cloud_security_posture[*Add Kubernetes Security Posture Management*].
. Name your integration. Use a name that matches the purpose or team of the cluster(s) you want to monitor, for example, `IT-dev-k8s-clusters`.
Expand All @@ -254,7 +254,7 @@ The *Add agent* wizard helps you deploy the KSPM integration on the Kubernetes c
1. Download the manifest and make any necessary revisions to its configuration to suit the needs of your environment.
2. Apply the manifest using the `kubectl apply -f` command. For example: `kubectl apply -f elastic-agent-managed-kubernetes.yaml`

After a few minutes, a message confirming the {agent} enrollment appears, followed by a message confirming that data is incoming. You can then click *View assets* to see where the newly-collected configuration information appears throughout {kib}, including the <<findings-page,Findings page>> and the <<cloud-posture-dashboard, Cloud Posture dashboard>>.
After a few minutes, a message confirming the {agent} enrollment appears, followed by a message confirming that data is incoming. You can then click *View assets* to see where the newly-collected configuration information appears throughout {kib}, including the <<findings-page,Findings page>> and the <<cloud-posture-dashboard, Cloud Security Posture dashboard>>.

[discrete]
[[kspm-eck]]
Expand Down
6 changes: 3 additions & 3 deletions docs/cloud-native-security/kspm.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ This integration supports Amazon EKS and unmanaged Kubernetes clusters. For setu
== How KSPM works
. When you add a KSPM integration, it generates a Kubernetes manifest. When applied to a cluster, the manifest deploys an {agent} as a https://kubernetes.io/docs/concepts/workloads/controllers/daemonset[DaemonSet] to ensure all nodes are evaluated.
. Upon deployment, the integration immediately assesses the security posture of your Kubernetes resources. The evaluation process repeats every four hours.
. After each evaluation, the integration sends findings to {es}. Findings appear on the <<cloud-nat-sec-posture-dashboard,Cloud posture dashboard>> and the <<findings-page,findings>> page.
. After each evaluation, the integration sends findings to {es}. Findings appear on the <<cloud-nat-sec-posture-dashboard,Cloud Security Posture dashboard>> and the <<findings-page,findings>> page.

[discrete]
[[kspm-use-cases]]
Expand All @@ -38,7 +38,7 @@ The KSPM integration helps you to:

To identify and remediate failed failed findings:

. Go to the <<cloud-nat-sec-posture-dashboard,Cloud posture dashboard>>.
. Go to the <<cloud-nat-sec-posture-dashboard,Cloud Security Posture dashboard>>.
. Click *View all failed findings*, either for an individual cluster or for all monitored clusters.
. Click a failed finding. The findings flyout opens.
. Follow the steps under *Remediation* to correct the misconfiguration.
Expand All @@ -61,7 +61,7 @@ To identify the Kubernetes resources generating the most failed findings:

To identify risks in particular CIS sections:

. Go to the <<cloud-nat-sec-posture-dashboard,Cloud posture dashboard>> (*Dashboards -> Cloud Posture*).
. Go to the <<cloud-nat-sec-posture-dashboard,Cloud Security Posture dashboard>> (*Dashboards -> Cloud Security Posture*).
. In the Failed findings by CIS section widget, click the name of a CIS section to view all failed findings for that section.

Alternatively:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,14 +23,14 @@ Using the data generated by these features, you can:

*Identify and secure misconfigured infrastructure:*

. Go to the Cloud Posture dashboard (*Dashboards > Cloud Posture*).
. Go to the Cloud Security Posture dashboard (*Dashboards > Cloud Security Posture*).
. Click *View all failed findings*, either for an individual resource or a group of resources.
. Click a failed finding to open the Findings flyout.
. Follow the steps under Remediation to fix the misconfiguration.

*Identify the CIS Sections (security best practice categories) with which your resources are least compliant:*

. Go to the Cloud Posture dashboard (*Dashboards > Cloud Posture*).
. Go to the Cloud Security Posture dashboard (*Dashboards > Cloud Security Posture*).
. Do one of the following:
.. Under Failed findings by CIS section, click the name of a CIS section to view all failed findings from that section.
.. Go to the *Findings* page and filter by the `rule.section` field. For example, search for `rule.section : API Server` to view findings from the API Server category.
Expand Down
12 changes: 6 additions & 6 deletions docs/dashboards/cloud-posture.asciidoc
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
[[cloud-posture-dashboard]]
// Note: This page is intentionally duplicated by docs/cloud-native-security/cloud-nat-sec-posture.asciidoc. When you update this page, update that page to match. And careful with the anchor links because they should not match.

= Cloud Posture dashboard
The Cloud Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To start collecting this data, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.
= Cloud Security Posture dashboard
The Cloud Security Posture dashboard summarizes your cloud infrastructure's overall performance against <<benchmark-rules,security guidelines>> defined by the Center for Internet Security (CIS). To start collecting this data, refer to <<cspm-get-started, Get started with Cloud Security Posture Management>> or <<get-started-with-kspm, Get started with Kubernetes Security Posture Management>>.

[role="screenshot"]
image::images/cloud-sec-dashboard.png[The cloud Security dashboard]

The Cloud Posture dashboard shows:
The Cloud Security Posture dashboard shows:

* Configuration risk metrics for all monitored cloud accounts and Kubernetes clusters
* Configuration risk metrics for individual cloud accounts and Kubernetes clusters
Expand All @@ -16,12 +16,12 @@ The Cloud Posture dashboard shows:
.Requirements
[sidebar]
--
* The Cloud Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
* The Cloud Security Posture dashboard is available to all Elastic Cloud users. For on-prem deployments, it requires an https://www.elastic.co/pricing[Enterprise subscription].
--

[discrete]
[[cloud-posture-dashboard-UI]]
=== Cloud Posture dashboard UI
=== Cloud Security Posture dashboard UI

At the top of the dashboard, you can switch between the Cloud accounts and Kubernetes cluster views.

Expand All @@ -32,7 +32,7 @@ The remaining summary cards show your overall posture score, and total failed fi
Below the summary section, each row shows the CSP of a single Cloud account or Kubernetes cluster, including its name, when its posture was last evaluated, its compliance score, and failed findings grouped by CIS section. When you begin to monitor a new account or cluster, a new row appears.

[role="screenshot"]
image::images/cloud-sec-dashboard-individual-row.png[A row representing a single cluster in the Cloud Posture dashboard]
image::images/cloud-sec-dashboard-individual-row.png[A row representing a single cluster in the Cloud Security Posture dashboard]

[discrete]
[[cloud-posture-dashboard-faq]]
Expand Down
Binary file modified docs/dashboards/images/kubernetes-dashboard.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.