-
Notifications
You must be signed in to change notification settings - Fork 8.5k
[Cloud Security] update serverless roles to support csp index alias #223999
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Cloud Security] update serverless roles to support csp index alias #223999
Conversation
|
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
gergoabraham
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hey @CohenIdo,
could you please do the same additions to these files as well? thanks!
- src/platform/packages/shared/kbn-es/src/serverless_resources/project_roles/security/roles.yml
- x-pack/solutions/security/plugins/security_solution/scripts/endpoint/common/roles_users/serverless/es_serverless_resources/roles.yml
(note, i'm not really sure why there are 3 files of these, but added to my todo list to check it sometime)
|
Thanks for this input @gergoabraham ! |
c4fb664 to
875b530
Compare
gergoabraham
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks for the changes! one line looks missing, but other than that, lgtm!
| - risk-score.risk-score-* | ||
| - .asset-criticality.asset-criticality-* | ||
| - '.ml-anomalies-*' | ||
| - 'security_solution-cloud_security_posture.misconfiguration_latest' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks like the detections_admin role below this missed the update
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Two Three questions:
- why do we have only index alias added here but not index pattern itself to cover indexes themselves with suffix like _v1?
- we don't have patterns for 3p indexes added, do we need to add them?
- as we are switching from
logs-*tosecurity_solution-*index pattern I'd expect it to be in the same bucket withlogs-*and sometimes it's the case but not always. Any reason for that? what is the logic behind picking priviliges?
| allow_restricted_indices: false | ||
| - names: | ||
| - '.ml-anomalies-*' | ||
| - 'security_solution-cloud_security_posture.misconfiguration_latest' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we are switching from logs-cloud_security_posture* to this index security_solution-cloud_security_posture.misconfiguration_latest so I'd expect it to be in one bucket with logs-* to keep exactly the same functionality as before. Any reason to have it with .ml-anomalies-* here and only have read provilige while logs-* has both read and write?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good question.
The logs-cloud_security_posture* index fall under the broader logs-* pattern, which currently has broader privileges assigned to each role.
However, we didn’t explicitly grant those privileges, and they’re not necessary for the current user experience. Now that we’re explicitly configuring permissions, I believe read access should be sufficient.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
discussed in person, agreed that overall having less priviliges is a good idea, but maybe should be implemented as a separate work item as we are close to the FF. It will be safer to keep the same priviliges as before to avoid any unwanted side effects and extensive testing with different roles
| - read | ||
| - names: | ||
| - .asset-criticality.asset-criticality-* | ||
| - 'security_solution-cloud_security_posture.misconfiguration_latest' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
here as well, any reason to not be in the same bucket with logs-* which has only read?
| - risk-score.risk-score-* | ||
| - .entities.v1.latest.security_* | ||
| - '.ml-anomalies-*' | ||
| - 'security_solution-cloud_security_posture.misconfiguration_latest' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
same here
| - risk-score.risk-score-* | ||
| - .entities.v1.latest.security_* | ||
| - '.ml-anomalies-*' | ||
| - 'security_solution-cloud_security_posture.misconfiguration_latest' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
same here
I agree I'll update the code to use
Here are my thoughts. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
src/platform/packages/shared/kbn-es/src/serverless_resources/project_roles/security/roles.yml changes LGTM
d52456e to
cce45e3
Compare
💚 Build Succeeded
Metrics [docs]
History
|
solves:
Related PR:
Summary
With the upcoming release of the Cloud Security Posture integration, we are introducing a new “Latest” transform along with a new index alias:
security_solution-cloud_security_posture.misconfiguration_latest.In #187435, we began querying this new index alias instead of
logs-cloud_security_posture.findings_latest-default.To maintain the same user experience, this PR updates the pre-defined roles in Serverless, allowing users to view findings and access the dashboard page.