Skip to content

Commit 48d9f2c

Browse files
benironsidemergify[bot]
authored andcommitted
Removes statement about CSPM only working in default space (#6911)
(cherry picked from commit 86631d5) # Conflicts: # docs/cloud-native-security/cspm-get-started-aws.asciidoc # docs/cloud-native-security/cspm-get-started-azure.asciidoc # docs/cloud-native-security/cspm-get-started-gcp.asciidoc # docs/cloud-native-security/cspm.asciidoc
1 parent 5ca3437 commit 48d9f2c

File tree

4 files changed

+25
-0
lines changed

4 files changed

+25
-0
lines changed

docs/cloud-native-security/cspm-get-started-aws.asciidoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,16 @@ This page explains how to get started monitoring the security posture of your cl
1111
[sidebar]
1212
--
1313
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
14+
<<<<<<< HEAD
1415
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1516
* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
1617
* To view posture data, you need `read` privileges for the following {es} indices:
1718
** `logs-cloud_security_posture.findings_latest-*`
1819
** `logs-cloud_security_posture.scores-*`
1920
** `Logs-cloud_security_posture.findings`
21+
=======
22+
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
23+
>>>>>>> 86631d53 (Removes statement about CSPM only working in default space (#6911))
2024
* The user who gives the CSPM integration AWS permissions must be an AWS account `admin`.
2125
--
2226

docs/cloud-native-security/cspm-get-started-azure.asciidoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,18 @@ This page explains how to get started monitoring the security posture of your cl
1111
[sidebar]
1212
--
1313
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
14+
<<<<<<< HEAD
1415
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1516
* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
1617
* To view posture data, you need `read` privileges for the following {es} indices:
1718
** `logs-cloud_security_posture.findings_latest-*`
1819
** `logs-cloud_security_posture.scores-*`
1920
** `logs-cloud_security_posture.findings`
2021
* The user who gives the CSPM integration permissions must be an Azure subscription `admin`.
22+
=======
23+
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
24+
* The user who gives the CSPM integration permissions in Azure must be an Azure subscription `admin`.
25+
>>>>>>> 86631d53 (Removes statement about CSPM only working in default space (#6911))
2126
--
2227
2328
[discrete]

docs/cloud-native-security/cspm-get-started-gcp.asciidoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,16 @@ This page explains how to get started monitoring the security posture of your GC
1111
[sidebar]
1212
--
1313
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
14+
<<<<<<< HEAD
1415
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1516
* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
1617
* To view posture data, you need `read` privileges for the following {es} indices:
1718
** `logs-cloud_security_posture.findings_latest-*`
1819
** `logs-cloud_security_posture.scores-*`
1920
** `Logs-cloud_security_posture.findings`
21+
=======
22+
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
23+
>>>>>>> 86631d53 (Removes statement about CSPM only working in default space (#6911))
2024
* The user who gives the CSPM integration GCP permissions must be a GCP project `admin`.
2125
--
2226

docs/cloud-native-security/cspm.asciidoc

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,20 @@ This feature currently supports Amazon Web Services (AWS) and Google Cloud Platf
1010
--
1111
* CSPM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1212
* {stack} version 8.10 or greater.
13+
<<<<<<< HEAD
1314
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1415
* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
16+
=======
17+
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
18+
* `Read` privileges for the following {es} indices:
19+
** `logs-cloud_security_posture.findings_latest-*`
20+
** `logs-cloud_security_posture.scores-*`
21+
* The following {kib} privileges:
22+
** Security: `Read`
23+
** Integrations: `Read`
24+
** Saved Objects Management: `Read`
25+
** Fleet: `All`
26+
>>>>>>> 86631d53 (Removes statement about CSPM only working in default space (#6911))
1527
--
1628
1729
[discrete]

0 commit comments

Comments
 (0)