Skip to content

Commit b56dd55

Browse files
[8.13] Removes statement about CSPM only working in default space (backport #6911) (#6919)
* Removes statement about CSPM only working in default space (#6911) (cherry picked from commit 86631d5) # Conflicts: # docs/cloud-native-security/cspm-get-started-aws.asciidoc # docs/cloud-native-security/cspm-get-started-azure.asciidoc # docs/cloud-native-security/cspm-get-started-gcp.asciidoc # docs/cloud-native-security/cspm.asciidoc * fix merge conflicts --------- Co-authored-by: Benjamin Ironside Goldstein <[email protected]> Co-authored-by: Benjamin Ironside Goldstein <[email protected]>
1 parent 36311a9 commit b56dd55

File tree

4 files changed

+8
-4
lines changed

4 files changed

+8
-4
lines changed

docs/cloud-native-security/cspm-get-started-aws.asciidoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@ This page explains how to get started monitoring the security posture of your cl
1111
[sidebar]
1212
--
1313
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
14-
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1514
* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
1615
* To view posture data, you need `read` privileges for the following {es} indices:
1716
** `logs-cloud_security_posture.findings_latest-*`

docs/cloud-native-security/cspm-get-started-azure.asciidoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@ This page explains how to get started monitoring the security posture of your cl
1111
[sidebar]
1212
--
1313
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
14-
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1514
* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
1615
* To view posture data, you need `read` privileges for the following {es} indices:
1716
** `logs-cloud_security_posture.findings_latest-*`

docs/cloud-native-security/cspm-get-started-gcp.asciidoc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@ This page explains how to get started monitoring the security posture of your GC
1111
[sidebar]
1212
--
1313
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
14-
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1514
* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
1615
* To view posture data, you need `read` privileges for the following {es} indices:
1716
** `logs-cloud_security_posture.findings_latest-*`

docs/cloud-native-security/cspm.asciidoc

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,15 @@ This feature currently supports Amazon Web Services (AWS), Google Cloud Platform
1010
--
1111
* CSPM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1212
* {stack} version 8.10 or greater.
13-
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
1413
* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
14+
* `Read` privileges for the following {es} indices:
15+
** `logs-cloud_security_posture.findings_latest-*`
16+
** `logs-cloud_security_posture.scores-*`
17+
* The following {kib} privileges:
18+
** Security: `Read`
19+
** Integrations: `Read`
20+
** Saved Objects Management: `Read`
21+
** Fleet: `All`
1522
--
1623

1724
[discrete]

0 commit comments

Comments
 (0)