Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[8.12] Update CSPM docs (backport #4836) #4892

Merged
merged 2 commits into from
Mar 13, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/cloud-native-security/cspm-faq.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ You can access findings data using the following index patterns:
Resources are fetched and evaluated against benchmark rules when a security posture management integration is deployed. After that, the CSPM integration evaluates every 24 hours, and the KSPM integration evaluates every four hours.

*Can I configure an integration's fetch cycle?*
No, the four-hour fetch cycle is not configurable.
No, the fetch cycle's timing is not configurable.

*Can I contribute to the CSP ruleset?*
You can't directly edit benchmark rules. The rules are defined https://github.com/elastic/csp-security-policies[in this repository], where you can raise issues with certain rules. They are written in https://www.openpolicyagent.org/docs/latest/policy-language/[Rego].
Expand Down
2 changes: 1 addition & 1 deletion docs/cloud-native-security/cspm.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -17,5 +17,5 @@ This feature currently supports Amazon Web Services (AWS), Google Cloud Platform
[[cspm-how-it-works]]
== How CSPM works

Using the read-only credentials you will provide during the setup process, it will evaluate the configuration of resources in your environment every 4 hours.
Using the read-only credentials you will provide during the setup process, it will evaluate the configuration of resources in your environment every 24 hours.
After each evaluation, the integration sends findings to Elastic. A high-level summary of the findings appears on the <<cloud-nat-sec-posture-dashboard,Cloud Security Posture dashboard>>, and detailed findings appear on the <<findings-page,Findings page>>.