-
Notifications
You must be signed in to change notification settings - Fork 8.5k
Closed
Labels
Feature:Detection RulesSecurity Solution rules and Detection EngineSecurity Solution rules and Detection EngineTeam: SecuritySolutionSecurity Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.Team:SIEMdiscussv7.10.0
Description
With the introduction of RBAC in kibana alerting (#67157, #67157 (comment)), users who wish to create or edit or view rules will need to set permissions for alerting and actions if:
- The user wants to create alerts, that role will require "all" permissions for "alerting" and either "read" or "all" for actions.
- The user wants to create alerts and custom action connectors for a rule, that role will require "all" permissions for alerting and "all" permissions for actions.
- The user wants to view alerts, that role will require "read" permissions for "alerting and either "read" or "none" for actions.
- If a user does not have "all" or "read" for actions, but they have "all" for alerting, then we will need to hide the UI section for creating actions or disable the actions step during rule creation.
In general the suggestion will be to set alerting and actions permissions to be whatever the permissions are for the security solution in that given role.
Metadata
Metadata
Assignees
Labels
Feature:Detection RulesSecurity Solution rules and Detection EngineSecurity Solution rules and Detection EngineTeam: SecuritySolutionSecurity Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.Team:SIEMdiscussv7.10.0
