Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Cloud Security] add CDR related data streams to kibana_system priviliges #112655

Merged

Conversation

maxcold
Copy link
Contributor

@maxcold maxcold commented Sep 9, 2024

Summary

The Cloud Security team has identified some integrations that provide Cloud Detection&Response (CDR)-related data. More on this list is available at https://github.com/elastic/security-team/issues/10302. To decouple the work on adoption for these integrations for Cloud Security flows in Kibana from the stack releases, adding these existing data streams to the kibana_system privileges. This is required for the latest transforms to work

@maxcold maxcold added >non-issue :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Cloud Security Meta label for Cloud Security team v8.16.0 labels Sep 9, 2024
@elasticsearchmachine elasticsearchmachine added the external-contributor Pull request authored by a developer outside the Elasticsearch team label Sep 9, 2024
@maxcold maxcold marked this pull request as ready for review September 9, 2024 13:56
@maxcold maxcold requested a review from a team as a code owner September 9, 2024 13:56
@elasticsearchmachine elasticsearchmachine added the Team:Security Meta label for security team label Sep 9, 2024
@elasticsearchmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

Copy link

@jeramysoucy jeramysoucy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We're ok with adding these additional read-only privileges, but please make sure all system-accessible indices get documented appropriately (see #112192 (comment)). Could you please link to the issue or PR where you intend to make these doc changes? Thanks!

@maxcold
Copy link
Contributor Author

maxcold commented Sep 11, 2024

@jeramysoucy created an issue to track the documentation effort https://github.com/elastic/security-team/issues/10540

@maxcold maxcold force-pushed the csp-add-cdr-data-streams-to-kibana-system branch from 2bc6fdb to 43d7dcd Compare September 11, 2024 14:35
@maxcold maxcold merged commit d16a27e into elastic:main Sep 11, 2024
20 checks passed
@maxcold maxcold deleted the csp-add-cdr-data-streams-to-kibana-system branch September 11, 2024 16:05
v1v added a commit to v1v/elasticsearch that referenced this pull request Sep 12, 2024
…tion-ironbank-ubi

* upstream/main: (302 commits)
  Deduplicate BucketOrder when deserializing (elastic#112707)
  Introduce test utils for ingest pipelines (elastic#112733)
  [Test] Account for auto-repairing for shard gen file (elastic#112778)
  Do not throw in task enqueued by CancellableRunner (elastic#112780)
  Mute org.elasticsearch.script.StatsSummaryTests testEqualsAndHashCode elastic#112439
  Mute org.elasticsearch.repositories.blobstore.testkit.integrity.RepositoryVerifyIntegrityIT testTransportException elastic#112779
  Use a dedicated test executor in MockTransportService (elastic#112748)
  Estimate segment field usages (elastic#112760)
  (Doc+) Inference Pipeline ignores Mapping Analyzers (elastic#112522)
  Fix verifyVersions task (elastic#112765)
  (Doc+) Terminating Exit Codes (elastic#112530)
  (Doc+) CAT Nodes default columns (elastic#112715)
  [DOCS] Augment installation warnings (elastic#112756)
  Mute org.elasticsearch.repositories.blobstore.testkit.integrity.RepositoryVerifyIntegrityIT testCorruption elastic#112769
  Bump Elasticsearch to a minimum of JDK 21 (elastic#112252)
  ESQL: Compute support for filtering ungrouped aggs (elastic#112717)
  Bump Elasticsearch version to 9.0.0 (elastic#112570)
  add CDR related data streams to kibana_system priviliges (elastic#112655)
  Support widening of numeric types in union-types (elastic#112610)
  Introduce data stream options and failure store configuration classes (elastic#109515)
  ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
external-contributor Pull request authored by a developer outside the Elasticsearch team >non-issue :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Cloud Security Meta label for Cloud Security team Team:Security Meta label for security team v8.16.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants