Conversation
🌐 Coverage report
|
DaveSys911
left a comment
There was a problem hiding this comment.
snippet in suggestion
Co-authored-by: David Natachanny <david.natachanny@elastic.co>
|
@amirbenun @kfirpeled @amirbenun can y'all please review for technical accuracy? thx! |
|
@tinnytintin10 Are we planning to add EKS screenshots as well as part of this PR? |
There was a problem hiding this comment.
Looks good!
Merging In order to let @uri-weisman go ahed with his #3968
Will bump version in a follow up PR - #3997
benironside
left a comment
There was a problem hiding this comment.
Looks good overall, left some minor suggestions. Not sure about the formatting for links etc. in a readme so couldn't check you on that.
|
|
||
| ## Leader election | ||
| 1. Identify and remediate misconfigurations | ||
| 2. Understand the overall security posture of their Kubernetes clusters both- individually and holistically |
There was a problem hiding this comment.
| 2. Understand the overall security posture of their Kubernetes clusters both- individually and holistically | |
| 2. Understand the overall security posture of their Kubernetes clusters, both individually and holistically |
|
|
||
| Cluster level data example: List of the running pods. | ||
| Node level data example: kubelet configuration. | ||
| After this integration has been installed for the first time, the following assets will get created and made available in the Security solution UI: |
There was a problem hiding this comment.
| After this integration has been installed for the first time, the following assets will get created and made available in the Security solution UI: | |
| After this integration has been installed for the first time, the following assets will get created and made available in the Elastic Security UI: |
|
|
||
| | Asset | Description | | ||
| | ----------------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | | ||
| | Posture Dashboard | The posture dashboard provides an overview of the security posture of all Kubernetes clusters monitored | |
There was a problem hiding this comment.
| | Posture Dashboard | The posture dashboard provides an overview of the security posture of all Kubernetes clusters monitored | | |
| | Cloud Posture dashboard | The Cloud Posture dashboard provides an overview of the security posture of all monitored Kubernetes clusters | |
| | Asset | Description | | ||
| | ----------------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | | ||
| | Posture Dashboard | The posture dashboard provides an overview of the security posture of all Kubernetes clusters monitored | | ||
| | Findings | Findings communicate the outcome of a specific resource being evaluated with a specific rule. All latest findings are viewable on the findings page | |
There was a problem hiding this comment.
| | Findings | Findings communicate the outcome of a specific resource being evaluated with a specific rule. All latest findings are viewable on the findings page | | |
| | Findings | Findings communicate whether resources are compliant with applicable rules. Current findings are viewable on the Findings page | |
| | ----------------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | | ||
| | Posture Dashboard | The posture dashboard provides an overview of the security posture of all Kubernetes clusters monitored | | ||
| | Findings | Findings communicate the outcome of a specific resource being evaluated with a specific rule. All latest findings are viewable on the findings page | | ||
| | Benchmark Rules | Benchmark rules are used to assess Kubernetes resources for secure configuration. Benchmark rules are viewable on the Benchmark page | |
There was a problem hiding this comment.
| | Benchmark Rules | Benchmark rules are used to assess Kubernetes resources for secure configuration. Benchmark rules are viewable on the Benchmark page | | |
| | Benchmark Rules | Benchmark rules are used to assess Kubernetes resources for secure configuration. Benchmark rules are viewable on the Benchmarks page | |
| ## Permissions | ||
|
|
||
| CIS Kubernetes Benchmark integration is shipped including default dashboards and screens to manage the benchmark rules and inspect the compliance score and findings. | ||
| This integration requires access to node files, node processes, and the Kubernetes api-server therefore it assumes the agent will be installed as a [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) with the proper [Roles](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#role-and-clusterrole) and [RoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) attached. |
There was a problem hiding this comment.
| This integration requires access to node files, node processes, and the Kubernetes api-server therefore it assumes the agent will be installed as a [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) with the proper [Roles](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#role-and-clusterrole) and [RoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) attached. | |
| This integration requires access to node files, node processes, and the Kubernetes api-server. Therefore it assumes the agent will be installed as a [DaemonSet](https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/) with the proper [Roles](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#role-and-clusterrole) and [RoleBindings](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#rolebinding-and-clusterrolebinding) attached. |
|
|
||
| ## Leader election | ||
|
|
||
| To collect cluster level data (compared to node level information) the integration makes use of the [leader election](https://www.elastic.co/guide/en/fleet/master/kubernetes_leaderelection-provider.html) mechanism. |
There was a problem hiding this comment.
| To collect cluster level data (compared to node level information) the integration makes use of the [leader election](https://www.elastic.co/guide/en/fleet/master/kubernetes_leaderelection-provider.html) mechanism. | |
| To collect cluster level data (rather than just node level information) the integration makes use of the [leader election](https://www.elastic.co/guide/en/fleet/master/kubernetes_leaderelection-provider.html) mechanism. |
What does this PR do?
Updates to the readme of the KSPM integration to include
Beyond these two main changes, all the other changes were cosmetic updates to the structure/order of the different sections in the readme.