Skip to content

Documents SIEM readiness page#5688

Merged
benironside merged 18 commits intomainfrom
5513-siem-readiness
Apr 15, 2026
Merged

Documents SIEM readiness page#5688
benironside merged 18 commits intomainfrom
5513-siem-readiness

Conversation

@benironside
Copy link
Copy Markdown
Contributor

Summary

Documents the new SIEM Readiness launchpad feature in Elastic Sec. Fixes #5513

Generative AI disclosure

  1. Did you use a generative AI (GenAI) tool to assist in creating this contribution?
  • [ x] Yes Claude 4.6 / Cursor
  • No

@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Mar 31, 2026

@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Mar 31, 2026

✅ Vale Linting Results

No issues found on modified lines!


The Vale linter checks documentation changes against the Elastic Docs style guide.

To use Vale locally or report issues, refer to Elastic style guide for Vale.

@benironside benironside self-assigned this Mar 31, 2026
@benironside benironside marked this pull request as ready for review March 31, 2026 17:00
@benironside benironside requested review from a team as code owners March 31, 2026 17:00
Copy link
Copy Markdown
Member

@nastasha-solomon nastasha-solomon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice job!

:screenshot:
:::

### Retention [siem-readiness-retention]
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should add that for Serverless, ILMs do not exist, its DSL only

:screenshot:
:::

### Continuity [siem-readiness-continuity]
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We might need to mention that the stats for ingested docs and thus also failure rates are missing in serverless


The Quality pillar answers: *Is your data ECS-compatible?* Schema errors can prevent rules, dashboards, and other features from working correctly.

It checks your indices for [Elastic Common Schema (ECS)](ecs://reference/ecs-event.md) compatibility issues and missing fields. It groups indices by data category (such as Endpoint, Identity, Network, and Cloud), and each category shows:
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Application/SaaS is the 5th category of data, please mention it in here and also describe the 5 categories under Data coverage section. @benironside

@JordanSh
Copy link
Copy Markdown
Contributor

JordanSh commented Apr 9, 2026

SIEM Readiness Page — Required Privileges

Kibana Privileges

Privilege Required For
securitySolution Access to the page and all SIEM readiness APIs
rules-read Coverage tab — viewing enabled detection rules
integrations-read (Fleet) Coverage tab — viewing installed integrations and their status

Elasticsearch Index Privileges

These must be granted on the relevant indices (logs-*, metrics-*, or whichever indices the user's data lives in):

Privilege Required For
read Coverage tab — category detection and MITRE ATT&CK doc counts
view_index_metadata All tabs — reading index settings, mappings, data stream metadata, and data quality results
monitor Continuity tab — ingest pipeline stats (nodes.stats). Quality tab — index stats

Elasticsearch Cluster Privileges

Privilege Required For
monitor Continuity tab — fetching ingest pipeline statistics from node stats
read_ilm Retention tab — reading ILM lifecycle policies

Per-Tab Breakdown

Tab Kibana Privileges ES Index Privileges ES Cluster Privileges
Coverage securitySolution, rules-read, integrations-read read, view_index_metadata
Quality securitySolution read, view_index_metadata, monitor
Continuity securitySolution view_index_metadata monitor
Retention securitySolution view_index_metadata read_ilm

Notes

  • A user with only the built-in viewer role will be able to access the page but will see empty or incomplete data in most tabs. The Kibana-level securitySolution privilege is satisfied, but the underlying Elasticsearch calls require additional index and cluster privileges.
  • The Fleet integrations API is the only call that returns an explicit 403 error. All other APIs silently return empty or partial results when the user lacks privileges.
  • The Quality tab also requires monitor (or manage) per index for the auto-check feature to fetch index stats and for quality results to be saved and retrieved.
  • The Cases integration (creating/viewing cases from any tab) uses its own authorization model and works for any user with case access in Security Solution.

@benironside benironside dismissed smriti0321’s stale review April 9, 2026 22:23

Dismissing Smriti's review since I incorporated her request and she validated it over Slack/

Comment thread solutions/security/get-started/siem-readiness.md Outdated
Comment thread solutions/security/get-started/siem-readiness.md Outdated
@benironside benironside enabled auto-merge (squash) April 15, 2026 18:41
@benironside benironside merged commit 74f6aa6 into main Apr 15, 2026
7 checks passed
@benironside benironside deleted the 5513-siem-readiness branch April 15, 2026 18:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Internal]: New feature SIEM Readiness documentation

5 participants