Skip to content

Commit 86631d5

Browse files
authored
Removes statement about CSPM only working in default space (#6911)
1 parent 16be7ba commit 86631d5

File tree

4 files changed

+0
-4
lines changed

4 files changed

+0
-4
lines changed

docs/cloud-native-security/cspm-get-started-aws.asciidoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@ This page explains how to get started monitoring the security posture of your cl
1212
--
1313
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1414
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
15-
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1615
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
1716
* The user who gives the CSPM integration AWS permissions must be an AWS account `admin`.
1817
--

docs/cloud-native-security/cspm-get-started-azure.asciidoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@ This page explains how to get started monitoring the security posture of your cl
1212
--
1313
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1414
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
15-
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1615
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
1716
* The user who gives the CSPM integration permissions in Azure must be an Azure subscription `admin`.
1817
--

docs/cloud-native-security/cspm-get-started-gcp.asciidoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@ This page explains how to get started monitoring the security posture of your GC
1212
--
1313
* Minimum privileges vary depending on whether you need to read, write, or manage CSPM data and integrations. Refer to <<cspm-required-permissions>>.
1414
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
15-
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1615
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
1716
* The user who gives the CSPM integration GCP permissions must be a GCP project `admin`.
1817
--

docs/cloud-native-security/cspm.asciidoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ This feature currently supports agentless and agent-based deployments on Amazon
1010
--
1111
* CSPM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1212
* {stack} version 8.10 or greater.
13-
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1413
* CSPM is supported only on AWS, GCP, and Azure commercial cloud platforms, and AWS GovCloud. Other government cloud platforms are not supported. https://github.com/elastic/kibana/issues/new/choose[Click here to request support].
1514
* `Read` privileges for the following {es} indices:
1615
** `logs-cloud_security_posture.findings_latest-*`

0 commit comments

Comments
 (0)