From bfae1d2d18301488d0669bfc5988e8eec7bba614 Mon Sep 17 00:00:00 2001 From: Smriti <152067238+smriti0321@users.noreply.github.com> Date: Fri, 14 Feb 2025 14:06:39 +0100 Subject: [PATCH] Update 0046-additional-rule-field.md As per comment (https://github.com/elastic/ecs/pull/2386#pullrequestreview-2613407287) on Stage 1 of this RFC. Adding the usage, source data and scope of impact --- rfcs/text/0046-additional-rule-field.md | 23 ++++++++--------------- 1 file changed, 8 insertions(+), 15 deletions(-) diff --git a/rfcs/text/0046-additional-rule-field.md b/rfcs/text/0046-additional-rule-field.md index f9354ce2f2..4c871f03f4 100644 --- a/rfcs/text/0046-additional-rule-field.md +++ b/rfcs/text/0046-additional-rule-field.md @@ -26,31 +26,24 @@ rule.remediation | array | Enable encryption on all S3 buckets | Used to capture ## Usage +The new remediation field will be used to track and manage remediation actions for compliance findings identified by the CIS benchmarks across AWS, GCP, and Azure environments. This field will help security teams to document the steps taken to address non-compliance issues, ensuring that all actions are recorded and can be audited. For example, if a CIS benchmark identifies that multi-factor authentication (MFA) is not enabled for all users, the remediation field will include details on how MFA was enabled and verified. -## Source data +In practice, this field will be leveraged by security operations teams to ensure that all compliance gaps are addressed promptly and effectively. It will also be used by auditors to verify that the organization is adhering to security best practices and regulatory requirements. By having a standardized field for remediation, organizations can streamline their compliance processes and improve their overall security posture. - +## Source data +Potential sources of data for the remediation field include: - ## Scope of impact ## Concerns