Skip to content

[Cloud Security] Updating the CSPM integration with deployment_mode and secrets #11271

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged

Conversation

seanrathier
Copy link
Contributor

@seanrathier seanrathier commented Sep 27, 2024

Proposed commit message

We added deployment_modes to the CSPM integration and the secret attribute for the inputs that the linting thought should have that set.

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.

How to test this PR locally

  1. In Kibana pull this PR locally
  2. Start elastic-package and Kibana
  3. In your browser navigate to

Related issues

@elastic-vault-github-plugin-prod

🚀 Benchmarks report

To see the full report comment with /test benchmark fullreport

@andrewkroh andrewkroh added the Integration:cloud_security_posture Security Posture Management label Sep 27, 2024
@seanrathier seanrathier force-pushed the 10847-update-cspm-deployment-mode branch from cb06892 to 01fbfe3 Compare October 1, 2024 13:29
@andrewkroh andrewkroh added the enhancement New feature or request label Oct 1, 2024
@elasticmachine
Copy link

💚 Build Succeeded

History

Copy link

@seanrathier seanrathier self-assigned this Oct 1, 2024
@seanrathier seanrathier marked this pull request as ready for review October 1, 2024 21:42
@seanrathier seanrathier requested a review from a team as a code owner October 1, 2024 21:42
@seanrathier seanrathier requested a review from a team October 1, 2024 21:43
@andrewkroh andrewkroh added the Team:Cloud Security Cloud Security team [elastic/cloud-security-posture] label Oct 1, 2024
@seanrathier seanrathier added the Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations] label Oct 2, 2024
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

Copy link
Contributor

@Omolola-Akinleye Omolola-Akinleye left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good just want to confirm if we should secrets as false

@@ -113,6 +116,7 @@ streams:
multi: false
required: false
show_user: true
secret: false
Copy link
Contributor

@Omolola-Akinleye Omolola-Akinleye Oct 2, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should secret access key be true? Security concern regards of exposing secret access keys

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The lint for the integration identified these fields as needing the secret attributes, likely because they have the name access_key and session_key.

Since we already have other fields with the secret attribute set to true, I assumed these were not meant to be masked like a password.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

okay got it! Thanks!

@@ -55,6 +56,7 @@ streams:
multi: false
required: false
show_user: true
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should secret access key be true? We don't want to expose secret?

@@ -100,6 +102,7 @@ streams:
multi: false
required: false
show_user: true
secret: false
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should shared credentials file secret be true?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@@ -42,6 +42,7 @@ streams:
multi: false
required: false
show_user: true
secret: false
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Any security concern regards adding secret as false?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Omolola-Akinleye Omolola-Akinleye self-requested a review October 2, 2024 17:01
@Omolola-Akinleye Omolola-Akinleye dismissed their stale review October 2, 2024 17:02

I missed secrets change and want to address security concerns

@seanrathier seanrathier merged commit 477593e into elastic:main Oct 7, 2024
5 checks passed
@elastic-vault-github-plugin-prod

Package cloud_security_posture - 1.11.0-preview10 containing this change is available at https://epr.elastic.co/search?package=cloud_security_posture

@elastic-vault-github-plugin-prod

Package cloud_security_posture - 1.11.0 containing this change is available at https://epr.elastic.co/package/cloud_security_posture/1.11.0/

harnish-crest-data pushed a commit to chavdaharnish/integrations that referenced this pull request Feb 4, 2025
…nd secrets (elastic#11271)

* Updating the CSPM integration with deployment_mode and secrets

* buming version

* changelog
harnish-crest-data pushed a commit to chavdaharnish/integrations that referenced this pull request Feb 5, 2025
…nd secrets (elastic#11271)

* Updating the CSPM integration with deployment_mode and secrets

* buming version

* changelog
@seanrathier seanrathier deleted the 10847-update-cspm-deployment-mode branch February 6, 2025 22:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request Integration:cloud_security_posture Security Posture Management Team:Cloud Security Cloud Security team [elastic/cloud-security-posture] Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations]
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Update integration to include deployment mode
4 participants