-
Notifications
You must be signed in to change notification settings - Fork 474
[Cloud Posture] add benchmark id to rule template #3654
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
🌐 Coverage report
|
/test |
packages/cloud_security_posture/data_stream/findings/manifest.yml
Outdated
Show resolved
Hide resolved
description: Check CIS Benchmark compliance | ||
description: | | ||
Check CIS Benchmark compliance | ||
###### only a single benchmark can be enabled. default is K8s CIS. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit today's markdown makes the text in capital letters, however, it can be changed at some point - consider changing it to Only a single benchmark can be enabled. Default is K8s CIS.
- just to be on the safe side
description: Check CIS Amazon Benchmark compliance | ||
description: | | ||
Check CIS Amazon Benchmark compliance | ||
###### only a single benchmark can be enabled. default is K8s CIS. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
same
description: Check CIS Benchmark compliance | ||
description: | | ||
Check CIS Benchmark compliance | ||
###### only a single benchmark can be enabled. default is K8s CIS. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
###### only a single benchmark can be enabled. default is K8s CIS. | |
###### Only a single benchmark can be enabled. Default is K8s CIS. |
description: Check CIS Amazon Benchmark compliance | ||
description: | | ||
Check CIS Amazon Benchmark compliance | ||
###### only a single benchmark can be enabled. default is K8s CIS. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
###### only a single benchmark can be enabled. default is K8s CIS. | |
###### Only a single benchmark can be enabled. Default is K8s CIS. |
/test |
/test |
What does this PR do?
this PR uses the newly introduced
benchmark.id
property and assigns every existing rule templates to usecis_k8s
as its benchmark id.when EKS rule templates are introduced, they should be added with their benchmark id property set to
cis_eks
Checklist
I have verified that all data streams collect metrics or logs.changelog.yml
file.I have verified that Kibana version constraints are current according to guidelines.How to test this PR locally
xpack.fleet.registryUrl: 'http://localhost:8080'
inkibana.dev.yml
eks
rulecis_k8s
ruleid
so it's unique (replace a single char)benchmark.id
tocis_eks
elastic-package build && elastic-package stack up -v -s package-registry
92
forcis_k8s
and1
forcis_eks
example:
