Skip to content

Commit 94fc79b

Browse files
Merge branch 'main' into issue-5-value-list-constraints-pt2
2 parents 987c94d + eb739ef commit 94fc79b

26 files changed

+137
-2070
lines changed

.backportrc.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
22
"upstream": "elastic/security-docs",
3-
"branches": [{ "name": "7.x", "checked": true }, "8.13", "8.12", "8.11", "8.10", "8.9", "8.8", "8.7", "8.6", "8.5", "8.4", "8.3", "8.2", "8.1", "8.0", "7.17", "7.16", "7.15", "7.14", "7.13", "7.12", "7.11", "7.10", "7.9", "7.8"],
3+
"branches": [{ "name": "7.x", "checked": true }, "8.14", "8.13", "8.12", "8.11", "8.10", "8.9", "8.8", "8.7", "8.6", "8.5", "8.4", "8.3", "8.2", "8.1", "8.0", "7.17", "7.16", "7.15", "7.14", "7.13", "7.12", "7.11", "7.10", "7.9", "7.8"],
44
"labels": ["backport"]
55
}

.mergify.yml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,20 @@ pull_request_rules:
1313
git merge upstream/{{base}}
1414
git push upstream {{head}}
1515
```
16+
- name: backport patches to 8.14 branch
17+
conditions:
18+
- merged
19+
- base=main
20+
- label=v8.14.0
21+
actions:
22+
backport:
23+
assignees:
24+
- "{{ author }}"
25+
branches:
26+
- "8.14"
27+
title: "[{{ destination_branch }}] {{ title }} (backport #{{ number }})"
28+
labels:
29+
- backport
1630
- name: backport patches to 8.13 branch
1731
conditions:
1832
- merged

docs/advanced-entity-analytics/analyze-risk-score-data.asciidoc

Lines changed: 17 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -48,65 +48,50 @@ Learn more about <<customize-the-alerts-table, customizing the Alerts table>>.
4848
image::images/alerts-table-rs.png[Risk scores in the Alerts table]
4949

5050
[discrete]
51-
==== Triage alerts associated with high-risk entities
51+
[[triage-alerts-associated-with-high-risk-or-business-critical-entities]]
52+
==== Triage alerts associated with high-risk or business-critical entities
5253

53-
To analyze alerts associated with high-risk entities, you can filter or group them by entity risk level.
54+
To analyze alerts associated with high-risk or business-critical entities, you can filter or group them by entity risk level or asset criticality level.
5455

55-
* Use the drop-down filter controls to filter alerts by entity risk level. To do this, <<drop-down-filter-controls, edit the default controls>> to filter by `user.risk.calculated_level` or `host.risk.calculated_level`:
56-
+
57-
[role="screenshot"]
58-
image::images/filter-by-host-risk-level.png[Alerts filtered by high host risk level]
56+
NOTE: If you change the entity's criticality level after an alert is generated, that alert document will include the original criticality level and will not reflect the new criticality level.
57+
58+
* Use the drop-down filter controls to filter alerts by entity risk level or asset criticality level. To do this, <<drop-down-filter-controls, edit the default controls>> to filter by:
5959

60-
* To group alerts by entity risk level, select **Group alerts by**, then select **Custom field** and search for `host.risk.calculated_level` or `user.risk.calculated_level`.
60+
** `user.risk.calculated_level` or `host.risk.calculated_level` for entity risk level:
6161
+
6262
[role="screenshot"]
63-
image::images/group-by-host-risk-level.png[Alerts grouped by host risk levels]
63+
image::images/filter-by-host-risk-level.png[Alerts filtered by high host risk level]
6464

65-
** You can further sort the grouped alerts by highest entity risk score:
66-
+
67-
--
68-
... Expand a risk level group, for example **High**.
69-
... Select **Sort fields** → **Pick fields to sort by**.
70-
... Select fields in the following order:
71-
.... `host.risk.calculated_score_norm`or `user.risk.calculated_score_norm`: **High-Low**
72-
.... `Risk score`: **High-Low**
73-
.... `@timestamp`: **New-Old**
74-
--
65+
** `user.asset.criticality` or `host.asset.criticality` for asset criticality level:
7566
+
7667
[role="screenshot"]
77-
image::images/hrl-sort-by-host-risk-score.png[High-risk alerts sorted by host risk score]
78-
79-
[discrete]
80-
[[triage-alerts-associated-with-business-critical-entities]]
81-
==== Triage alerts associated with business-critical entities
82-
83-
To analyze alerts associated with business-critical entities, you can filter or group them by entity asset criticality.
68+
image::images/filter-by-asset-criticality.png[Filter alerts by asset criticality level]
8469

85-
NOTE: If you change the entity's criticality level after an alert is generated, that alert document will include the original criticality level and will not reflect the new criticality level.
70+
* To group alerts by entity risk level or asset criticality level, select **Group alerts by**, then select **Custom field** and search for:
8671

87-
* Use the drop-down filter controls to filter alerts by asset criticality level. To do this, <<drop-down-filter-controls, edit the default controls>> to filter by `user.asset.criticality` or `host.asset.criticality`:
72+
** `host.risk.calculated_level` or `user.risk.calculated_level` for entity risk level:
8873
+
8974
[role="screenshot"]
90-
image::images/filter-by-asset-criticality.png[Filter alerts by asset criticality level]
75+
image::images/group-by-host-risk-level.png[Alerts grouped by host risk levels]
9176

92-
* To group alerts by asset criticality level, select **Group alerts by**, then select **Custom field** and search for `host.asset.criticality` or `user.asset.criticality`.
77+
** `host.asset.criticality` or `user.asset.criticality` for asset criticality level:
9378
+
9479
[role="screenshot"]
9580
image::images/group-by-asset-criticality.png[Alerts grouped by entity asset criticality levels]
9681

9782
** You can further sort the grouped alerts by highest entity risk score:
9883
+
9984
--
100-
... Expand an asset criticality group, for example **high_impact**.
85+
... Expand a risk level group (for example, **High**) or an asset criticality group (for example, **high_impact**).
10186
... Select **Sort fields** → **Pick fields to sort by**.
10287
... Select fields in the following order:
103-
.... `host.risk.calculated_score_norm`or `user.risk.calculated_score_norm`: **High-Low**
88+
.... `host.risk.calculated_score_norm` or `user.risk.calculated_score_norm`: **High-Low**
10489
.... `Risk score`: **High-Low**
10590
.... `@timestamp`: **New-Old**
10691
--
10792
+
10893
[role="screenshot"]
109-
image::images/ac-sort-by-host-risk-score.png[High-impact alerts sorted by host risk score]
94+
image::images/hrl-sort-by-host-risk-score.png[High-risk alerts sorted by host risk score]
11095

11196
[discrete]
11297
[[alert-details-flyout]]

docs/advanced-entity-analytics/asset-criticality.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ For example, you can assign **Extreme impact** to business-critical entities, or
2626
[discrete]
2727
== View and assign asset criticality
2828

29-
Entities do not have a default asset criticality level. You can view, assign, and change asset criticality from the following places in the {elastic-sec} app:
29+
Entities do not have a default asset criticality level. You can view, assign, change, or unassign asset criticality from the following places in the {elastic-sec} app:
3030

3131
* The <<host-details-page, host details page>> and <<user-details-page, user details page>>:
3232
+
@@ -57,7 +57,7 @@ With asset criticality, you can improve your security operations by:
5757

5858
You can use asset criticality as a prioritization factor when triaging alerts and conducting investigations and response activities.
5959

60-
Once you assign a criticality level to an entity, all subsequent alerts related to that entity are enriched with its criticality level. This additional context allows you to <<triage-alerts-associated-with-business-critical-entities, prioritize alerts associated with high-impact entities>>.
60+
Once you assign a criticality level to an entity, all subsequent alerts related to that entity are enriched with its criticality level. This additional context allows you to <<triage-alerts-associated-with-high-risk-or-business-critical-entities, prioritize alerts associated with business-critical entities>>.
6161

6262
[discrete]
6363
[[monitor-entity-risk]]

docs/advanced-entity-analytics/entity-risk-scoring.asciidoc

Lines changed: 15 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,14 @@ It also generates risk scores on a recurring interval, and allows for easy onboa
1414

1515
Entity risk scores are determined by the following risk inputs:
1616

17-
* <<alerts-ui-manage, Alerts>>, stored in the `.alerts-security.alerts-<space-id>` index alias
18-
* <<asset-criticality, Asset criticality level>>, stored in the `.asset-criticality.asset-criticality-<space-id>` index alias
17+
[width="100%",options="header"]
18+
|==============================================
19+
|Risk input |Storage location
20+
21+
|<<alerts-ui-manage, Alerts>> |`.alerts-security.alerts-<space-id>` index alias
22+
|<<asset-criticality, Asset criticality level>> |`.asset-criticality.asset-criticality-<space-id>` index alias
23+
|==============================================
24+
1925

2026
The resulting entity risk scores are stored in the `risk-score.risk-score-<space-id>` data stream alias.
2127

@@ -29,10 +35,12 @@ The resulting entity risk scores are stored in the `risk-score.risk-score-<space
2935
[[how-is-risk-score-calculated]]
3036
== How is risk score calculated?
3137

32-
The risk scoring engine runs hourly to aggregate `Open` and `Acknowledged` alerts from the last 30 days. For each entity, the engine processes up to 10,000 alerts. It groups alerts by `host.name` or `user.name`, and aggregates the individual alert risk scores (`kibana.alert.risk_score`) such that alerts with higher risk scores contribute more than alerts with lower risk scores. The resulting aggregated risk score is assigned to the **Alerts** category in the entity's <<host-risk-summary, risk summary>>.
38+
. The risk scoring engine runs hourly to aggregate `Open` and `Acknowledged` alerts from the last 30 days. For each entity, the engine processes up to 10,000 alerts.
3339

34-
The engine then verifies the entity's <<asset-criticality, asset criticality level>>. If there is no asset criticality assigned, the entity risk score remains equal to the aggregated score from the **Alerts** category. If a criticality level is assigned, the engine updates the risk score based on the default risk weight for each criticality level:
40+
. The engine groups alerts by `host.name` or `user.name`, and aggregates the individual alert risk scores (`kibana.alert.risk_score`) such that alerts with higher risk scores contribute more than alerts with lower risk scores. The resulting aggregated risk score is assigned to the **Alerts** category in the entity's <<host-risk-summary, risk summary>>.
3541

42+
. The engine then verifies the entity's <<asset-criticality, asset criticality level>>. If there is no asset criticality assigned, the entity risk score remains equal to the aggregated score from the **Alerts** category. If a criticality level is assigned, the engine updates the risk score based on the default risk weight for each criticality level. The asset criticality risk input is assigned to the **Asset Criticality** category in the entity's risk summary.
43+
+
3644
[width="100%",options="header"]
3745
|==============================================
3846
|Asset criticality level |Default risk weight
@@ -43,13 +51,11 @@ The engine then verifies the entity's <<asset-criticality, asset criticality lev
4351
|Extreme impact |2
4452

4553
|==============================================
46-
54+
+
4755
NOTE: Asset criticality levels and default risk weights are subject to change.
4856

49-
The asset criticality risk input is assigned to the **Asset Criticality** category in the entity's risk summary.
50-
51-
Based on the two risk inputs, the risk scoring engine generates a single numeric value, normalized to a 0-100 range, as the entity risk score. It assigns a risk level by mapping the normalized risk score to one of these levels:
52-
57+
. Based on the two risk inputs, the risk scoring engine generates a single entity risk score of 0-100. It assigns a risk level by mapping the risk score to one of these levels:
58+
+
5359
[width="100%",options="header"]
5460
|==============================================
5561
|Risk level |Risk score
Binary file not shown.
-19.7 KB
Loading

docs/cases/cases-manage.asciidoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,8 @@ To explore the alerts attached to a case, click the *Alerts* tab. In the table,
173173
[role="screenshot"]
174174
image::images/cases-alert-tab.png[Shows you the Alerts tab]
175175

176+
NOTE: Each case can have a maximum of 1,000 alerts.
177+
176178
[float]
177179
[[cases-add-files]]
178180
=== Add files

docs/cloud-native-security/cspm-faq.asciidoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,7 @@ Frequently asked questions about the Kubernetes Security Posture Management (KSP
2828

2929
*What versions of Kubernetes are supported?*
3030

31-
For self-managed/vanilla clusters, Kubernetes version 1.23 is supported.
32-
33-
For EKS clusters, all Kubernetes versions available at the time of cluster deployment are supported.
31+
For self-managed/vanilla and EKS clusters, Kubernetes version 1.23 is supported.
3432

3533
*Do benchmark rules support multiple Kubernetes deployment types?*
3634
Yes. There are different sets of benchmark rules for self-managed and third party-managed deployments. Refer to <<get-started-with-kspm,Get started with KSPM>> for more information about setting up each deployment type.

docs/cloud-native-security/cspm-get-started-gcp.asciidoc

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,15 @@ For most users, the simplest option is to use a Google Cloud Shell script to aut
5959
+
6060
image::images/cspm-cloudshell-trust.png[The cloud shell confirmation popup]
6161
+
62+
NOTE: Google has deprecated its old Cloud Shell editor. If you continue to use it, you may encounter the following message:
63+
+
64+
image::images/cspm-cloudshell-old-editor.png[The cloud shell switch editor popup]
65+
+
66+
If the message appears, click **X** or **Try the new Editor** and follow the next steps. When you switch to the new editor, your context should remain unchanged.
6267
. In Google Cloud Shell, execute the command you copied. Once it finishes, return to {kib} and wait for the confirmation of data received from your new integration. Then you can click **View Assets** to see your data.
6368

69+
NOTE: If you encounter any issues running the command, return to {kib} and navigate again to Google Cloud Shell.
70+
6471
NOTE: During Cloud Shell setup, the CSPM integration adds roles to Google's default service account, which enables custom role creation and attachment of the service account to a compute instance.
6572
After setup, these roles are removed from the service account. If you attempt to delete the deployment but find the deployment manager lacks necessary permissions, consider adding the missing roles to the service account:
6673
https://cloud.google.com/iam/docs/understanding-roles#resourcemanager.projectIamAdmin[Project IAM Admin], https://cloud.google.com/iam/docs/understanding-roles#iam.roleAdmin[Role Administrator].

0 commit comments

Comments
 (0)