Skip to content

Commit 64ebd7f

Browse files
committed
ports updates to serverless
1 parent bd79b81 commit 64ebd7f

File tree

5 files changed

+65
-15
lines changed

5 files changed

+65
-15
lines changed

docs/serverless/cloud-native-security/cspm-get-started-azure.asciidoc

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,9 @@ This page explains how to get started monitoring the security posture of your cl
1414
.Requirements
1515
[NOTE]
1616
====
17+
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1718
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1819
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported (https://github.com/elastic/kibana/issues/new/choose[request support]).
19-
* To view posture data, you need `read` privileges for the following {es} indices:
20-
+
21-
** `logs-cloud_security_posture.findings_latest-*`
22-
** `logs-cloud_security_posture.scores-*`
23-
** `logs-cloud_security_posture.findings`
2420
* The user who gives the CSPM integration permissions in Azure must be an Azure subscription `admin`.
2521
====
2622

docs/serverless/cloud-native-security/cspm-get-started-gcp.asciidoc

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,9 @@ This page explains how to get started monitoring the security posture of your cl
1414
.Requirements
1515
[NOTE]
1616
====
17+
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1718
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1819
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported (https://github.com/elastic/kibana/issues/new/choose[request support]).
19-
* To view posture data, you need the appropriate user role to read the following {es} indices:
20-
+
21-
** `logs-cloud_security_posture.findings_latest-*`
22-
** `logs-cloud_security_posture.scores-*`
23-
** `Logs-cloud_security_posture.findings`
2420
* The user who gives the CSPM integration GCP permissions must be a GCP project `admin`.
2521
====
2622

docs/serverless/cloud-native-security/cspm-get-started.asciidoc

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,9 @@ This page explains how to get started monitoring the security posture of your cl
1414
.Requirements
1515
[NOTE]
1616
====
17+
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1718
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1819
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported (https://github.com/elastic/kibana/issues/new/choose[request support]).
19-
* To view posture data, you need the appropriate user role to read the following {es} indices:
20-
+
21-
** `logs-cloud_security_posture.findings_latest-*`
22-
** `logs-cloud_security_posture.scores-*`
23-
** `Logs-cloud_security_posture.findings`
2420
* The user who gives the CSPM integration AWS permissions must be an AWS account `admin`.
2521
====
2622

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
[[cspm-required-permissions]]
2+
= CSPM privilege requirements
3+
4+
This page lists required privilges for {elastic-sec}'s CSPM features. There are three access levels: read, write, and manage. Each access level and its requirements are described below.
5+
6+
[discrete]
7+
== Read
8+
9+
Users with these minimum permissions can view data on the Findings page and the Cloud Posture dashboard.
10+
11+
[discrete]
12+
=== {es} index privileges
13+
`Read` privileges for the following {es} indices:
14+
15+
* `logs-cloud_security_posture.findings_latest-*`
16+
* `logs-cloud_security_posture.scores-*`
17+
18+
[discrete]
19+
=== {kib} privileges
20+
21+
* `Security: Read`
22+
23+
24+
[discrete]
25+
== Write
26+
27+
Users with these minimum permissions can view data on the Findings page and the Cloud Posture dashboard, create detection rules from the findings details flyout, and enable or disable benchmark rules.
28+
29+
[discrete]
30+
=== {es} index privileges
31+
`Read` privileges for the following {es} indices:
32+
33+
* `logs-cloud_security_posture.findings_latest-*`
34+
* `logs-cloud_security_posture.scores-*`
35+
36+
[discrete]
37+
=== {kib} privileges
38+
39+
* `Security: All`
40+
41+
42+
[discrete]
43+
== Manage
44+
45+
Users with these minimum permissions can view data on the Findings page and the Cloud Posture dashboard, create detection rules from the findings details flyout, enable or disable benchmark rules, and install, update, or uninstall CSPM integrations and assets.
46+
47+
[discrete]
48+
=== {es} index privileges
49+
`Read` privileges for the following {es} indices:
50+
51+
* `logs-cloud_security_posture.findings_latest-*`
52+
* `logs-cloud_security_posture.scores-*`
53+
54+
[discrete]
55+
=== {kib} privileges
56+
57+
* `Security: All`
58+
* `Spaces: All`
59+
* `Fleet: All`
60+
* `Integrations: All`
61+

docs/serverless/index.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,7 @@ include::./cloud-native-security/cspm.asciidoc[leveloffset=+3]
8888
include::./cloud-native-security/cspm-get-started.asciidoc[leveloffset=+4]
8989
include::./cloud-native-security/cspm-get-started-gcp.asciidoc[leveloffset=+4]
9090
include::./cloud-native-security/cspm-get-started-azure.asciidoc[leveloffset=+4]
91+
include::./cloud-native-security/cspm-permissions.asciidoc[leveloffset=+4]
9192
include::./cloud-native-security/cspm-findings-page.asciidoc[leveloffset=+4]
9293
include::./cloud-native-security/benchmark-rules.asciidoc[leveloffset=+4]
9394
include::./cloud-native-security/cspm-cloud-posture-dashboard-dash.asciidoc[leveloffset=+4]

0 commit comments

Comments
 (0)