From 04c3b2f8adc40a4b445e12423c4d811e06e16518 Mon Sep 17 00:00:00 2001 From: Benjamin Ironside Goldstein Date: Thu, 2 May 2024 06:58:10 -0700 Subject: [PATCH 1/2] Updates requirements section for CNVM and CSPM --- docs/cloud-native-security/cspm-get-started-aws.asciidoc | 1 + docs/cloud-native-security/cspm-get-started-azure.asciidoc | 1 + docs/cloud-native-security/cspm-get-started-gcp.asciidoc | 1 + docs/cloud-native-security/cspm.asciidoc | 1 + docs/cloud-native-security/vuln-management-get-started.asciidoc | 1 + docs/cloud-native-security/vuln-management-overview.asciidoc | 1 + 6 files changed, 6 insertions(+) diff --git a/docs/cloud-native-security/cspm-get-started-aws.asciidoc b/docs/cloud-native-security/cspm-get-started-aws.asciidoc index 32032e4268..5fbceb9744 100644 --- a/docs/cloud-native-security/cspm-get-started-aws.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-aws.asciidoc @@ -11,6 +11,7 @@ This page explains how to get started monitoring the security posture of your cl [sidebar] -- * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. +* CSPM only works in the `Default` Kibana space. Installing the CSPM integration on a different Kibana space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). * To view posture data, you need `read` privileges for the following {es} indices: ** `logs-cloud_security_posture.findings_latest-*` diff --git a/docs/cloud-native-security/cspm-get-started-azure.asciidoc b/docs/cloud-native-security/cspm-get-started-azure.asciidoc index 73014a4b8e..3150b29eae 100644 --- a/docs/cloud-native-security/cspm-get-started-azure.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-azure.asciidoc @@ -11,6 +11,7 @@ This page explains how to get started monitoring the security posture of your cl [sidebar] -- * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. +* CSPM only works in the `Default` Kibana space. Installing the CSPM integration on a different Kibana space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). * To view posture data, you need `read` privileges for the following {es} indices: ** `logs-cloud_security_posture.findings_latest-*` diff --git a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc index 099c0b891d..a54fd49cf8 100644 --- a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc @@ -11,6 +11,7 @@ This page explains how to get started monitoring the security posture of your GC [sidebar] -- * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. +* CSPM only works in the `Default` Kibana space. Installing the CSPM integration on a different Kibana space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). * To view posture data, you need `read` privileges for the following {es} indices: ** `logs-cloud_security_posture.findings_latest-*` diff --git a/docs/cloud-native-security/cspm.asciidoc b/docs/cloud-native-security/cspm.asciidoc index 1a48a609de..6204d6e482 100644 --- a/docs/cloud-native-security/cspm.asciidoc +++ b/docs/cloud-native-security/cspm.asciidoc @@ -10,6 +10,7 @@ This feature currently supports Amazon Web Services (AWS), Google Cloud Platform -- * CSPM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. * {stack} version 8.10 or greater. +* CSPM only works in the `Default` Kibana space. Installing the CSPM integration on a different Kibana space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). -- diff --git a/docs/cloud-native-security/vuln-management-get-started.asciidoc b/docs/cloud-native-security/vuln-management-get-started.asciidoc index b65b378158..72ce9d662b 100644 --- a/docs/cloud-native-security/vuln-management-get-started.asciidoc +++ b/docs/cloud-native-security/vuln-management-get-started.asciidoc @@ -8,6 +8,7 @@ This page explains how to set up Cloud Native Vulnerability Management (CNVM). -- * CNVM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. * Requires {stack} and {agent} version 8.8 or higher. +* CNVM only works in the `Default` Kibana space. Installing the CNVM integration on a different Kibana space will not work. * To view vulnerability scan findings, you need at least `read` privileges for the following indices: ** `logs-cloud_security_posture.vulnerabilities-*` ** `logs-cloud_security_posture.vulnerabilities_latest-*` diff --git a/docs/cloud-native-security/vuln-management-overview.asciidoc b/docs/cloud-native-security/vuln-management-overview.asciidoc index 894f045b9a..f168698501 100644 --- a/docs/cloud-native-security/vuln-management-overview.asciidoc +++ b/docs/cloud-native-security/vuln-management-overview.asciidoc @@ -12,6 +12,7 @@ NOTE: CNVM currently only supports AWS EC2 Linux workloads. -- * CNVM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. * Requires {stack} and {agent} version 8.8 or higher. +* CNVM only works in the `Default` Kibana space. Installing the CNVM integration on a different Kibana space will not work. * To view vulnerability scan findings, you need at least `read` privileges for the following indices: ** `logs-cloud_security_posture.vulnerabilities-*` ** `logs-cloud_security_posture.vulnerabilities_latest-*` From e040d859e09e2f3563af15fd4af7652266526882 Mon Sep 17 00:00:00 2001 From: Benjamin Ironside Goldstein Date: Thu, 2 May 2024 10:08:57 -0700 Subject: [PATCH 2/2] minor updates - adds attribute --- docs/cloud-native-security/cspm-get-started-aws.asciidoc | 4 ++-- docs/cloud-native-security/cspm-get-started-azure.asciidoc | 2 +- docs/cloud-native-security/cspm-get-started-gcp.asciidoc | 2 +- docs/cloud-native-security/cspm.asciidoc | 2 +- .../vuln-management-get-started.asciidoc | 2 +- docs/cloud-native-security/vuln-management-overview.asciidoc | 2 +- 6 files changed, 7 insertions(+), 7 deletions(-) diff --git a/docs/cloud-native-security/cspm-get-started-aws.asciidoc b/docs/cloud-native-security/cspm-get-started-aws.asciidoc index 5fbceb9744..4870f9ae62 100644 --- a/docs/cloud-native-security/cspm-get-started-aws.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-aws.asciidoc @@ -11,7 +11,7 @@ This page explains how to get started monitoring the security posture of your cl [sidebar] -- * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. -* CSPM only works in the `Default` Kibana space. Installing the CSPM integration on a different Kibana space will not work. +* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). * To view posture data, you need `read` privileges for the following {es} indices: ** `logs-cloud_security_posture.findings_latest-*` @@ -204,7 +204,7 @@ image::images/cspm-aws-auth-3.png[The EC2 page in AWS, showing the Modify IAM ro .. Click *Update IAM role*. .. Return to {kib} and <>. -IMPORTANT: Make sure to deploy the CSPM integration to this EC2 instance. When completing setup in Kibana, in the *Setup Access* section, select *Assume role* and leave *Role ARN* empty. Click *Save and continue*. +IMPORTANT: Make sure to deploy the CSPM integration to this EC2 instance. When completing setup in {kib}, in the *Setup Access* section, select *Assume role* and leave *Role ARN* empty. Click *Save and continue*. [discrete] [[cspm-use-keys-directly]] diff --git a/docs/cloud-native-security/cspm-get-started-azure.asciidoc b/docs/cloud-native-security/cspm-get-started-azure.asciidoc index 3150b29eae..732e2ae8cd 100644 --- a/docs/cloud-native-security/cspm-get-started-azure.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-azure.asciidoc @@ -11,7 +11,7 @@ This page explains how to get started monitoring the security posture of your cl [sidebar] -- * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. -* CSPM only works in the `Default` Kibana space. Installing the CSPM integration on a different Kibana space will not work. +* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). * To view posture data, you need `read` privileges for the following {es} indices: ** `logs-cloud_security_posture.findings_latest-*` diff --git a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc index a54fd49cf8..3745844ae5 100644 --- a/docs/cloud-native-security/cspm-get-started-gcp.asciidoc +++ b/docs/cloud-native-security/cspm-get-started-gcp.asciidoc @@ -11,7 +11,7 @@ This page explains how to get started monitoring the security posture of your GC [sidebar] -- * The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. -* CSPM only works in the `Default` Kibana space. Installing the CSPM integration on a different Kibana space will not work. +* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). * To view posture data, you need `read` privileges for the following {es} indices: ** `logs-cloud_security_posture.findings_latest-*` diff --git a/docs/cloud-native-security/cspm.asciidoc b/docs/cloud-native-security/cspm.asciidoc index 6204d6e482..ff6c0989c7 100644 --- a/docs/cloud-native-security/cspm.asciidoc +++ b/docs/cloud-native-security/cspm.asciidoc @@ -10,7 +10,7 @@ This feature currently supports Amazon Web Services (AWS), Google Cloud Platform -- * CSPM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. * {stack} version 8.10 or greater. -* CSPM only works in the `Default` Kibana space. Installing the CSPM integration on a different Kibana space will not work. +* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work. * CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]). -- diff --git a/docs/cloud-native-security/vuln-management-get-started.asciidoc b/docs/cloud-native-security/vuln-management-get-started.asciidoc index 72ce9d662b..6736d9a4bc 100644 --- a/docs/cloud-native-security/vuln-management-get-started.asciidoc +++ b/docs/cloud-native-security/vuln-management-get-started.asciidoc @@ -8,7 +8,7 @@ This page explains how to set up Cloud Native Vulnerability Management (CNVM). -- * CNVM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. * Requires {stack} and {agent} version 8.8 or higher. -* CNVM only works in the `Default` Kibana space. Installing the CNVM integration on a different Kibana space will not work. +* CNVM only works in the `Default` {kib} space. Installing the CNVM integration on a different {kib} space will not work. * To view vulnerability scan findings, you need at least `read` privileges for the following indices: ** `logs-cloud_security_posture.vulnerabilities-*` ** `logs-cloud_security_posture.vulnerabilities_latest-*` diff --git a/docs/cloud-native-security/vuln-management-overview.asciidoc b/docs/cloud-native-security/vuln-management-overview.asciidoc index f168698501..974eb21530 100644 --- a/docs/cloud-native-security/vuln-management-overview.asciidoc +++ b/docs/cloud-native-security/vuln-management-overview.asciidoc @@ -12,7 +12,7 @@ NOTE: CNVM currently only supports AWS EC2 Linux workloads. -- * CNVM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription]. * Requires {stack} and {agent} version 8.8 or higher. -* CNVM only works in the `Default` Kibana space. Installing the CNVM integration on a different Kibana space will not work. +* CNVM only works in the `Default` {kib} space. Installing the CNVM integration on a different {kib} space will not work. * To view vulnerability scan findings, you need at least `read` privileges for the following indices: ** `logs-cloud_security_posture.vulnerabilities-*` ** `logs-cloud_security_posture.vulnerabilities_latest-*`