-
Notifications
You must be signed in to change notification settings - Fork 469
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adopt Secrets in Cloud Posture Management #8604
Adopt Secrets in Cloud Posture Management #8604
Conversation
230a0b1
to
a572eb3
Compare
🌐 Coverage report
|
@romulets |
a572eb3
to
f020514
Compare
Tested with CSPM AWS. Secrets are stored properly and properly retrieved in cloudbeat After a call with @amirbenun we agreed that testing one integration is enough, because cloudbeat doesn't do anything special to retrieve configurations our secrets. This piece is all automatically handled by the elastic/beats library and fleet-server implementation. Therefore if it works for one CSPM AWS, other CSPM and KSPM should have no further problems. @oren-zohar do you agree with the above statement? |
f448753
to
ff435a3
Compare
Package cloud_security_posture - 1.7.0-preview07 containing this change is available at https://epr.elastic.co/search?package=cloud_security_posture |
Package cloud_security_posture - 1.7.0-preview08 containing this change is available at https://epr.elastic.co/search?package=cloud_security_posture |
What
Adopt Secrets in Cloud Posture Management
Based on elastic/package-spec#665 definition of what is possibly a secret the following the keys were labeled as secrets:
Based on the criteria used of what potentially is a secret, more fields would have been classified as secret. Below you can find why they were not:
Why
Adoption of secrets is a kibana wide effort to remove the possibility of secrets leaks in kibana (via system logs/audit or humans)
Checklist
changelog.yml
file.Author's Checklist
Related issues
Screenshots
Example of stored secret: